Overview
Device pairing controls who can interact with profClaw through chat channels. When someone messages profClaw for the first time from an unknown account, device pairing can require them to verify their identity with a code before any tools run. This prevents unauthorized users from discovering a profClaw instance and using it to execute commands.Pairing Methods
- QR Code Pairing
- DM Verification Code
Generate a QR code that the user scans with their phone to prove they are a trusted device.
Setup
How It Works
- profClaw generates a unique pairing token (TOTP-based)
- The user scans the QR code in the profClaw mobile app or web UI
- The app verifies the token against the profClaw server
- The device receives a trust certificate stored locally
- Future messages from this device bypass DM verification
Device Identity
Each device that pairs with profClaw receives a unique device identity:Trust Levels
| Level | Permissions |
|---|---|
full | All tools, all channels |
limited | Standard tier tools only, no dangerous operations |
read-only | Safe tools only (read_file, grep, git_status, etc.) |
Managing Paired Devices
Channel Allowlisting
Restrict which channels profClaw responds to:Session-Level Security
When a chat session is active, security context travels with it:- The authenticated
userIdfrom the original request - The
channelProviderandchannelId - The applicable security mode and exec policies
- The device’s trust level
full.
Audit Trail
All pairing events are recorded in the audit log:- Device paired: device ID, platform, time
- Verification code issued: channel, code expiry
- Verification success/failure: user ID, attempts
- Device revoked: admin user, reason