How to Use the Agent-to-Human Communication (A2H) Protocol with OpenClaw

February 19, 2026
Written by

OpenClaw is one of the most ambitious autonomous agent projects today, a personal AI assistant that connects to WhatsApp, Telegram, Discord, and 15+ other channels, with the ability to execute shell commands, manage files, and interact with the world on your behalf.

It's also a case study in why A2H, the Agent-to-Human Communications Protocol, matters.

The problem: Autonomy without accountability

OpenClaw users on Hacker News reported experiences like:

  • "I woke up in the morning and it had been replying to ANY and ALL of my iMessages." ( 1 )
  • "Without sandboxing, this thing could probably ruin your life." ( 2 )
  • "The security story is basically 'hope for the best.'" ( 3 )
  • "It hallucinated... Everything needs review." ( 4 )

These aren't criticisms of OpenClaw specifically – they're symptoms of a missing layer in the autonomous agent stack. When agents can act without gates, without proof, and without audit trails, users are left choosing between capability and control.

What OpenClaw has today

Diagram showing OpenClaw's messaging platform integrations, gateway, and supported agent types.
Diagram showing OpenClaw's messaging platform integrations, gateway, and supported agent types.

OpenClaw does have a security model: sandboxing, allowlists, DM pairing codes, and approval gates via CLI. Here's a typical exec tool config:

{
  "tools": {
    "exec": {
      "ask": "on-miss",
      "security": "allowlist",
      "host": "sandbox"
    }
  }
}

When a command isn't in the allowlist, OpenClaw prompts for approval in the same channel. The openclaw approvals CLI manages pending requests, and openclaw security audit --deep can harden the configuration automatically.

This is real access control, but there's a gap between approval and attestation:


What Exists What's Missing
Allowlists + sandbox  Cryptographic evidence of approval
Same-channel prompts Out-of-band escalation for high-risk ops
approval-pending status Signed proof for audit trails
Security audit CLI  Third-party attestation

What A2H adds

A2H bridges the gap from "approval" to "consent with evidence":

{
  "tools": {
    "exec": {
      "ask": "a2h",
      "a2h": {
        "assurance": {
          "rm *": "HIGH",
          "git push": "MEDIUM",
          "default": "LOW"
        }
      }
    }
  }
}

Now when your agent wants to run rm -rf /var/backups/*:

  1. The agent pauses and sends an AUTHORIZE request to A2H
  2. You receive an out-of-band notification (SMS, push) even if you're not watching the chat
  3. You authenticate with Face ID or Touch ID (not just typing "yes")
  4. The agent receives JWS-signed evidence and proceeds
  5. The evidence is attached to the audit log – cryptographic proof you approved

Try the OpenClaw integration example yourself:

cd a2h-spec/examples/openclaw-integration
npm install
npm start          # Terminal 1: Start A2H Gateway
node openclaw-simulator.js  # Terminal 2: Run the demo
OpenClaw channels = Conversation
A2H = Consent
Conversation + Consent = Trust

OpenClaw's channels are excellent at delivery. A2H adds the trust layer: proof that a human approved, proof of what they approved, and proof of when they approved it.

For users who are "too afraid to try" autonomous agents, A2H provides the safety net. For users who are already running OpenClaw, A2H provides the audit trail they'll wish they had when something goes wrong.

We're excited to work with the OpenClaw community to make autonomous agents both powerful and trustworthy.

Additional resources

 


Rikki Singh is a product and engineering leader based in Bay Area, California. At Twilio, she leads the Emerging Technology and Innovation group Twilio Forward. Outside of work, Rikki enjoys hiking and camping with her husband and toddler.

Ryan Ferguson is a Senior software engineer manager based in Boulder, Colorado. At Twilio, he helps lead engineering initiatives on the Emerging Technology and Innovation team, Twilio Forward. Outside of work, Ryan enjoys running ultra marathons.