
OpenClaw Integration with Synology Chat

By Sarah Jenkins


By Sarah Jenkins
Status: supported via plugin as a direct-message channel using Synology Chat webhooks.
The plugin accepts inbound messages from Synology Chat outgoing webhooks and sends replies
through a Synology Chat incoming webhook.
Synology Chat is plugin-based and not part of the default core channel install.
Install from a local checkout:
openclaw plugins install ./path/to/local/synology-chat-pluginopenclaw onboard now shows Synology Chat in the same channel setup list as openclaw channels add.openclaw channels add --channel synology-chat --token <token> --url <incoming-webhook-url>https://gateway-host/webhook/synology by default.channels.synology-chat.webhookPath.openclaw onboardopenclaw channels add --channel synology-chat --token <token> --url <incoming-webhook-url>Minimal config:
{
channels: {
"synology-chat": {
enabled: true,
token: "synology-outgoing-token",
incomingUrl: "https://nas.example.com/webapi/entry.cgi?api=SYNO.Chat.External&method=incoming&version=2&token=...",
webhookPath: "/webhook/synology",
dmPolicy: "allowlist",
allowedUserIds: ["123456"],
rateLimitPerMinute: 30,
allowInsecureSsl: false,
},
},
}For the default account, you can use env vars:
SYNOLOGY_CHAT_TOKENSYNOLOGY_CHAT_INCOMING_URLSYNOLOGY_NAS_HOSTSYNOLOGY_ALLOWED_USER_IDS (comma-separated)SYNOLOGY_RATE_LIMITOPENCLAW_BOT_NAMEConfig values override env vars.
dmPolicy: "allowlist" is the recommended default.allowedUserIds accepts a list (or comma-separated string) of Synology user IDs.allowlist mode, an empty allowedUserIds list is treated as misconfiguration and the webhook route will not start (use dmPolicy: "open" for allow-all).dmPolicy: "open" allows any sender.dmPolicy: "disabled" blocks DMs.user_id by default. channels.synology-chat.dangerouslyAllowNameMatching: true is break-glass compatibility mode that re-enables mutable username/nickname lookup for reply delivery.openclaw pairing list synology-chatopenclaw pairing approve synology-chat <CODE>Use numeric Synology Chat user IDs as targets.
Examples:
openclaw message send --channel synology-chat --target 123456 --text "Hello from OpenClaw"
openclaw message send --channel synology-chat --target synology-chat:123456 --text "Hello again"Media sends are supported by URL-based file delivery.
Multiple Synology Chat accounts are supported under channels.synology-chat.accounts.
Each account can override token, incoming URL, webhook path, DM policy, and limits.
Direct-message sessions are isolated per account and user, so the same numeric user_id
on two different Synology accounts does not share transcript state.
Give each enabled account a distinct webhookPath. OpenClaw now rejects duplicate exact paths
and refuses to start named accounts that only inherit a shared webhook path in multi-account setups.
If you intentionally need legacy inheritance for a named account, set
dangerouslyAllowInheritedWebhookPath: true on that account or at channels.synology-chat,
but duplicate exact paths are still rejected fail-closed. Prefer explicit per-account paths.
{
channels: {
"synology-chat": {
enabled: true,
accounts: {
default: {
token: "token-a",
incomingUrl: "https://nas-a.example.com/...token=...",
},
alerts: {
token: "token-b",
incomingUrl: "https://nas-b.example.com/...token=...",
webhookPath: "/webhook/synology-alerts",
dmPolicy: "allowlist",
allowedUserIds: ["987654"],
},
},
},
},
}token secret.allowInsecureSsl: false unless you explicitly trust a self-signed local NAS cert.dmPolicy: "allowlist" for production.dangerouslyAllowNameMatching off unless you explicitly need legacy username-based reply delivery.dangerouslyAllowInheritedWebhookPath off unless you explicitly accept shared-path routing risk in a multi-account setup.About the author

Sarah Jenkins is a seasoned OpenClaw developer with a strong focus on optimizing high-performance computing solutions. Her work primarily involves crafting efficient parallel algorithms and enhancing GPU acceleration for complex scientific simulations. Jenkins is renowned for her meticulous attention to detail and her ability to translate intricate theoretical concepts into practical, robust OpenClaw implementations.