Synology Chat
Status: bundled plugin direct-message channel using Synology Chat webhooks. The plugin accepts inbound messages from Synology Chat outgoing webhooks and sends replies through a Synology Chat incoming webhook.Bundled plugin
Synology Chat ships as a bundled plugin in current OpenClaw releases, so normal packaged builds do not need a separate install. If you are on an older build or a custom install that excludes Synology Chat, install it manually: Install from a local checkout:Quick setup
- Ensure the Synology Chat plugin is available.
- Current packaged OpenClaw releases already bundle it.
- Older/custom installs can add it manually from a source checkout with the command above.
openclaw onboardnow shows Synology Chat in the same channel setup list asopenclaw channels add.- Non-interactive setup:
openclaw channels add --channel synology-chat --token <token> --url <incoming-webhook-url>
- In Synology Chat integrations:
- Create an incoming webhook and copy its URL.
- Create an outgoing webhook with your secret token.
- Point the outgoing webhook URL to your OpenClaw gateway:
https://gateway-host/webhook/synologyby default.- Or your custom
channels.synology-chat.webhookPath.
- Finish setup in OpenClaw.
- Guided:
openclaw onboard - Direct:
openclaw channels add --channel synology-chat --token <token> --url <incoming-webhook-url>
- Guided:
- Restart gateway and send a DM to the Synology Chat bot.
- OpenClaw accepts the outgoing webhook token from
body.token, then?token=..., then headers. - Accepted header forms:
x-synology-tokenx-webhook-tokenx-openclaw-tokenAuthorization: Bearer <token>
- Empty or missing tokens fail closed.
Environment variables
For the default account, you can use env vars:SYNOLOGY_CHAT_TOKENSYNOLOGY_CHAT_INCOMING_URLSYNOLOGY_NAS_HOSTSYNOLOGY_ALLOWED_USER_IDS(comma-separated)SYNOLOGY_RATE_LIMITOPENCLAW_BOT_NAME
DM policy and access control
dmPolicy: "allowlist"is the recommended default.allowedUserIdsaccepts a list (or comma-separated string) of Synology user IDs.- In
allowlistmode, an emptyallowedUserIdslist is treated as misconfiguration and the webhook route will not start (usedmPolicy: "open"for allow-all). dmPolicy: "open"allows any sender.dmPolicy: "disabled"blocks DMs.- Reply recipient binding stays on stable numeric
user_idby default.channels.synology-chat.dangerouslyAllowNameMatching: trueis break-glass compatibility mode that re-enables mutable username/nickname lookup for reply delivery. - Pairing approvals work with:
openclaw pairing list synology-chatopenclaw pairing approve synology-chat <CODE>
Outbound delivery
Use numeric Synology Chat user IDs as targets. Examples:Multi-account
Multiple Synology Chat accounts are supported underchannels.synology-chat.accounts.
Each account can override token, incoming URL, webhook path, DM policy, and limits.
Direct-message sessions are isolated per account and user, so the same numeric user_id
on two different Synology accounts does not share transcript state.
Give each enabled account a distinct webhookPath. OpenClaw now rejects duplicate exact paths
and refuses to start named accounts that only inherit a shared webhook path in multi-account setups.
If you intentionally need legacy inheritance for a named account, set
dangerouslyAllowInheritedWebhookPath: true on that account or at channels.synology-chat,
but duplicate exact paths are still rejected fail-closed. Prefer explicit per-account paths.
Security notes
- Keep
tokensecret and rotate it if leaked. - Keep
allowInsecureSsl: falseunless you explicitly trust a self-signed local NAS cert. - Inbound webhook requests are token-verified and rate-limited per sender.
- Invalid token checks use constant-time secret comparison and fail closed.
- Prefer
dmPolicy: "allowlist"for production. - Keep
dangerouslyAllowNameMatchingoff unless you explicitly need legacy username-based reply delivery. - Keep
dangerouslyAllowInheritedWebhookPathoff unless you explicitly accept shared-path routing risk in a multi-account setup.
Troubleshooting
Missing required fields (token, user_id, text):- the outgoing webhook payload is missing one of the required fields
- if Synology sends the token in headers, make sure the gateway/proxy preserves those headers
Invalid token:- the outgoing webhook secret does not match
channels.synology-chat.token - the request is hitting the wrong account/webhook path
- a reverse proxy stripped the token header before the request reached OpenClaw
- the outgoing webhook secret does not match
Rate limit exceeded:- too many invalid token attempts from the same source can temporarily lock that source out
- authenticated senders also have a separate per-user message rate limit
Allowlist is empty. Configure allowedUserIds or use dmPolicy=open.:dmPolicy="allowlist"is enabled but no users are configured
User not authorized:- the sender’s numeric
user_idis not inallowedUserIds
- the sender’s numeric
Related
- Channels Overview — all supported channels
- Pairing — DM authentication and pairing flow
- Groups — group chat behavior and mention gating
- Channel Routing — session routing for messages
- Security — access model and hardening