documented channels
22
Guides for WhatsApp, Telegram, Discord, Slack, Signal, Teams, Matrix, LINE, WebChat, and more.
Find the right OpenClaw channel for WhatsApp, Telegram, Discord, Slack, Signal, Teams, Google Chat, LINE, Matrix, WebChat, BlueBubbles, and more. Each page covers setup, access policy, transport, verification, and troubleshooting.
documented channels
22
Guides for WhatsApp, Telegram, Discord, Slack, Signal, Teams, Matrix, LINE, WebChat, and more.
built-in routes
10
Core, recommended, browser, and legacy channels that usually make the shortlist first.
community plugins
12
Plugin-backed, regional, and self-hosted channels including Feishu, Mattermost, Nextcloud Talk, Twitch, Tlon, and Zalo.
OpenClaw channels
The list starts with the most common deployments, then moves into self-hosted, regional, and experimental channels.
WhatsApp for OpenClaw: QR linking, session ownership, account-safety posture, DM and group policy, and the failure modes operators need to plan for before going live.
Auth model
WhatsApp Web session or provider-backed credentials
Safety stance
Treat account safety as a first-class operating requirement, not a footnote after setup succeeds.
Runtime stance
Measured rollout with explicit risk controls
Effort
30–45 min setup
Telegram Bot setup for OpenClaw: BotFather token handling, DM versus group policy, privacy mode, verification, streaming behavior, and the failure patterns operators hit first.
Auth model
Bot token + DM pairing or group permissions
Safety stance
Lock pairing scope early and verify privacy mode before exposing the bot to public groups.
Runtime stance
Rapid launch with iterative hardening
Effort
20–30 min setup
Discord Bot setup for OpenClaw: gateway intents, role permissions, DM versus guild behavior, verification drills, and moderation-aware rollout patterns.
Auth model
Bot token + gateway intents + guild roles
Safety stance
Make intents and role scope explicit before the bot ever lands in a shared server.
Runtime stance
Community deployment with moderation-aware defaults
Effort
25–40 min setup
Slack Bot setup for OpenClaw: scopes, Socket Mode or Events API behavior, thread policy, workspace rollout, and troubleshooting for silent bots.
Auth model
Slack app scopes + bot token + Socket Mode / Events API
Safety stance
Minimize scopes and verify thread semantics before broad workspace deployment.
Runtime stance
Policy-aware internal deployment
Effort
35–50 min setup
Microsoft Teams support for OpenClaw covers plugin-backed Azure Bot setup, Teams app manifest and RSC permissions, Graph-dependent media behavior, and tenant-scoped routing boundaries.
Auth model
Installed plugin + Bot Framework / Azure app credentials + tenant policy
Safety stance
Treat Azure registration, tenant policy, and Teams app visibility as one combined deployment problem.
Runtime stance
Enterprise plugin rollout with admin coordination
Effort
45–90 min setup
Signal for OpenClaw: signal-cli setup, linked-device or dedicated-number decisions, daemon health, DM and group policy, and the recovery posture privacy-focused operators should expect.
Auth model
signal-cli linked device + local service paths + account identity
Safety stance
Treat device linking, number ownership, and state persistence as first-class operational controls.
Runtime stance
Privacy-first deployment with explicit host dependencies
Effort
35–50 min setup
LINE Messaging API setup for OpenClaw: plugin installation, webhook wiring, channel credentials, verification drills, and rollout notes for supported regions.
Auth model
Installed plugin + LINE Messaging API credentials + webhook endpoint
Safety stance
Respect webhook integrity and account boundaries before adding richer templates or menu actions.
Runtime stance
Plugin-backed regional bot deployment
Effort
25–40 min setup
Google Chat setup for OpenClaw covers Chat API apps, webhook delivery, workspace permissions, and a clean verification path for internal rollouts.
Auth model
Google Chat app credentials + HTTP webhook configuration
Safety stance
Align Google Workspace permissions with the smallest audience possible before widening room access.
Runtime stance
Internal workspace deployment with webhook discipline
Effort
25–35 min setup
WebChat for OpenClaw covers browser access, WebSocket reachability, token bootstrap, pairing, and safe remote exposure for the built-in chat surface.
Auth model
Gateway token + browser pairing + WebSocket session
Safety stance
Because it feels local and simple, operators often underestimate the trust model and remote-access implications.
Runtime stance
Fastest browser-native path with trust-state awareness
Effort
10–20 min setup
Matrix support for OpenClaw covers plugin installation, homeserver login, DM and room policy, E2EE device verification, and federated routing boundaries.
Auth model
Installed plugin + Matrix homeserver credentials + room access policy
Safety stance
Document which homeserver, rooms, and federation assumptions define trust for this rollout.
Runtime stance
Plugin-backed federated deployment
Effort
25–45 min setup
Twitch chat setup for OpenClaw: plugin install, bot-account credentials, channel join behavior, allowlist versus role gating, mention requirements, token refresh, and live-chat verification.
Auth model
Installed plugin + Twitch chat credentials / IRC-style channel auth
Safety stance
Moderation boundaries and rate expectations matter as much as raw connectivity on a live stream surface.
Runtime stance
Live-chat deployment with moderation discipline
Effort
20–35 min setup
BlueBubbles for OpenClaw covers macOS server setup, REST connectivity, pairing boundaries, and advanced messaging behaviors for Apple-centric workflows.
Auth model
BlueBubbles server credentials + trusted macOS host
Safety stance
Treat the Mac host and BlueBubbles server as production infrastructure, not a casual desktop toggle.
Runtime stance
Recommended Apple-device rollout with host stability first
Effort
30–45 min setup
Mattermost support for OpenClaw covers plugin installation, bot token and base URL setup, channel chat modes, slash-command callbacks, and self-hosted workspace routing boundaries.
Auth model
Installed plugin + bot token + WebSocket / channel access config
Safety stance
Treat self-hosted chat policy and bot scope as part of the same operational document.
Runtime stance
Internal self-hosted collaboration rollout
Effort
20–35 min setup
Feishu integration for OpenClaw focuses on plugin installation, WebSocket bot setup, tenant permissions, verification, and team rollout hygiene.
Auth model
Installed plugin + tenant app credentials + WebSocket bot config
Safety stance
Treat tenant-level permissions and app scopes as part of the rollout plan, not a one-time form fill.
Runtime stance
Plugin-backed enterprise deployment
Effort
30–45 min setup
Nextcloud Talk for OpenClaw covers plugin setup, server credentials, room access, and a verification path tuned for self-hosted teams.
Auth model
Installed plugin + Nextcloud Talk credentials + room policy
Safety stance
Document which server, rooms, and identity policy define the trust boundary.
Runtime stance
Self-hosted collaboration rollout with room discipline
Effort
25–40 min setup
Synology Chat setup for OpenClaw: plugin install, outgoing versus incoming webhook roles, DM policy, user-ID allowlists, SSL posture, verification, and multi-account webhook routing.
Auth model
Installed plugin + outgoing / incoming webhooks + Synology Chat room config
Safety stance
Treat the NAS and webhook boundary as one security surface, especially on home or small-business networks.
Runtime stance
Self-hosted webhook deployment on Synology infrastructure
Effort
25–40 min setup
IRC for OpenClaw focuses on server connectivity, nick identity, channel versus DM rules, and allowlist-first operation on classic networks.
Auth model
IRC server connection + nick identity + channel access rules
Safety stance
On IRC, allowlists and pairing posture matter more than visual onboarding polish.
Runtime stance
Text-first operations with strict routing controls
Effort
20–35 min setup
Legacy iMessage support for OpenClaw via imsg: transition guidance, risk notes, verification expectations, and when to prefer BlueBubbles instead.
Auth model
Local macOS host + imsg CLI / JSON-RPC bridge
Safety stance
Present this lane as a migration or compatibility path, not the default recommendation.
Runtime stance
Legacy maintenance and transition planning
Effort
Legacy path
Zalo Bot API support for OpenClaw covers plugin-backed setup, bot credentials, local rollout conventions, and verification tuned for Vietnam-focused deployments.
Auth model
Installed plugin + Zalo Bot API credentials
Safety stance
Regional platform rules and account expectations should be documented alongside the technical setup.
Runtime stance
Regional plugin deployment with market-specific guardrails
Effort
25–40 min setup
Tlon/Urbit support for OpenClaw covers plugin-backed setup, identity assumptions, group access, and verification tailored to that ecosystem.
Auth model
Installed plugin + Urbit / Tlon identity and room configuration
Safety stance
Document the identity and room model explicitly because it differs from mainstream bot platforms.
Runtime stance
Protocol-specific community deployment
Effort
35–50 min setup
Nostr DM setup for OpenClaw: plugin install, relay strategy, private-key handling, DM policy, profile metadata, verification, and the protocol limits operators should understand before rollout.
Auth model
Installed plugin + key material + relay configuration
Safety stance
Key handling and relay selection are the actual product surface here, not just implementation details.
Runtime stance
Protocol-native decentralized deployment
Effort
15–30 min setup
Zalo Personal support for OpenClaw covers plugin-backed QR login, personal-account constraints, risk posture, and verification for cautious operators.
Auth model
Installed plugin + QR login + personal account session state
Safety stance
Make the personal-account tradeoffs explicit before anyone treats the lane as a safe default.
Runtime stance
Cautious experimental rollout with policy awareness
Effort
35–50 min setup
How to choose
Decide whether the real target is consumer chat, team workspace chat, self-hosted rooms, or the built-in WebChat console.
Pick the right operational model: QR login, bot token, Socket Mode, HTTP webhook, WebSocket, or local bridge.
Set pairing, allowlists, requireMention, roles, and group policy before the first broad rollout.
Validate direct replies, shared spaces, restart behavior, listener state, and one realistic failure before launch.
Every page covers
Bot tokens, QR sessions, WebSocket credentials, webhook secrets, or local bridge identities.
Every page covers
Pairing, allowlists, group policy, mention requirements, role checks, and sender boundaries.
Every page covers
First DM, group or room test, restart behavior, reconnect health, and known failure drills.