Matrix is a bundled channel plugin for OpenClaw. It uses the officialDocumentation Index
Fetch the complete documentation index at: https://docs.openclaw.ai/llms.txt
Use this file to discover all available pages before exploring further.
matrix-js-sdk and supports DMs, rooms, threads, media, reactions, polls, location, and E2EE.
Bundled plugin
Current packaged OpenClaw releases ship the Matrix plugin in the box. You do not need to install anything; configuringchannels.matrix.* (see Setup) is what activates it.
For older builds or custom installs that exclude Matrix, install manually first:
plugins install registers and enables the plugin, so no separate openclaw plugins enable matrix step is needed. The plugin still does nothing until you configure the channel below. See Plugins for general plugin behavior and install rules.
Setup
- Create a Matrix account on your homeserver.
- Configure
channels.matrixwith eitherhomeserver+accessToken, orhomeserver+userId+password. - Restart the gateway.
- Start a DM with the bot, or invite it to a room (see auto-join — fresh invites only land when
autoJoinallows them).
Interactive setup
MATRIX_* env vars already exist and the selected account has no saved auth, the wizard offers an env-var shortcut. To resolve room names before saving an allowlist, run openclaw channels resolve --channel matrix "Project Room". When E2EE is enabled, the wizard writes the config and runs the same bootstrap as openclaw matrix encryption setup.
Minimal config
Token-based:Auto-join
channels.matrix.autoJoin defaults to off. With the default, the bot will not appear in new rooms or DMs from fresh invites until you join manually.
OpenClaw cannot tell at invite time whether an invited room is a DM or a group, so all invites — including DM-style invites — go through autoJoin first. dm.policy only applies later, after the bot has joined and the room has been classified.
autoJoin: "always".
Allowlist target formats
DM and room allowlists are best populated with stable IDs:- DMs (
dm.allowFrom,groupAllowFrom,groups.<room>.users): use@user:server. Display names only resolve when the homeserver directory returns exactly one match. - Rooms (
groups,autoJoinAllowlist): use!room:serveror#alias:server. Names are resolved best-effort against joined rooms; unresolved entries are ignored at runtime.
Account ID normalization
The wizard converts a friendly name into a normalized account ID. For example,Ops Bot becomes ops-bot. Punctuation is escaped in scoped env-var names so that two accounts cannot collide: - → _X2D_, so ops-prod maps to MATRIX_OPS_X2D_PROD_*.
Cached credentials
Matrix stores cached credentials under~/.openclaw/credentials/matrix/:
- default account:
credentials.json - named accounts:
credentials-<account>.json
openclaw doctor, and channel-status probes.
Environment variables
Used when the equivalent config key is not set. The default account uses unprefixed names; named accounts use the account ID inserted before the suffix.| Default account | Named account (<ID> is the normalized account ID) |
|---|---|
MATRIX_HOMESERVER | MATRIX_<ID>_HOMESERVER |
MATRIX_ACCESS_TOKEN | MATRIX_<ID>_ACCESS_TOKEN |
MATRIX_USER_ID | MATRIX_<ID>_USER_ID |
MATRIX_PASSWORD | MATRIX_<ID>_PASSWORD |
MATRIX_DEVICE_ID | MATRIX_<ID>_DEVICE_ID |
MATRIX_DEVICE_NAME | MATRIX_<ID>_DEVICE_NAME |
MATRIX_RECOVERY_KEY | MATRIX_<ID>_RECOVERY_KEY |
ops, the names become MATRIX_OPS_HOMESERVER, MATRIX_OPS_ACCESS_TOKEN, and so on. The recovery-key env vars are read by recovery-aware CLI flows (verify backup restore, verify device, verify bootstrap) when you pipe the key in via --recovery-key-stdin.
MATRIX_HOMESERVER cannot be set from a workspace .env; see Workspace .env files.
Configuration example
A practical baseline with DM pairing, room allowlist, and E2EE:Streaming previews
Matrix reply streaming is opt-in.streaming controls how OpenClaw delivers the in-flight assistant reply; blockStreaming controls whether each completed block is preserved as its own Matrix message.
streaming | Behavior |
|---|---|
"off" (default) | Wait for the full reply, send once. true ↔ "partial", false ↔ "off". |
"partial" | Edit one normal text message in place as the model writes the current block. Stock Matrix clients may notify on the first preview, not the final edit. |
"quiet" | Same as "partial" but the message is a non-notifying notice. Recipients only get a notification once a per-user push rule matches the finalized edit (see below). |
blockStreaming is independent of streaming:
streaming | blockStreaming: true | blockStreaming: false (default) |
|---|---|---|
"partial" / "quiet" | Live draft for the current block, completed blocks kept as messages | Live draft for the current block, finalized in place |
"off" | One notifying Matrix message per finished block | One notifying Matrix message for the full reply |
- If a preview grows past Matrix’s per-event size limit, OpenClaw stops preview streaming and falls back to final-only delivery.
- Media replies always send attachments normally. If a stale preview can no longer be reused safely, OpenClaw redacts it before sending the final media reply.
- Tool-progress preview updates are enabled by default when Matrix preview streaming is active. Set
streaming.preview.toolProgress: falseto keep preview edits for answer text but leave tool progress on the normal delivery path. - Preview edits cost extra Matrix API calls. Leave
streaming: "off"if you want the most conservative rate-limit profile.
Approval metadata
Matrix native approval prompts are normalm.room.message events with OpenClaw-specific custom event content under com.openclaw.approval. Matrix permits custom event-content keys, so stock clients still render the text body while OpenClaw-aware clients can read the structured approval id, kind, state, available decisions, and exec/plugin details.
When an approval prompt is too long for one Matrix event, OpenClaw chunks the visible text and attaches com.openclaw.approval to the first chunk only. Reactions for allow/deny decisions are bound to that first event, so long prompts keep the same approval target as single-event prompts.
Self-hosted push rules for quiet finalized previews
streaming: "quiet" only notifies recipients once a block or turn is finalized — a per-user push rule has to match the finalized preview marker. See Matrix push rules for quiet previews for the full recipe (recipient token, pusher check, rule install, per-homeserver notes).
Bot-to-bot rooms
By default, Matrix messages from other configured OpenClaw Matrix accounts are ignored. UseallowBots when you intentionally want inter-agent Matrix traffic:
allowBots: trueaccepts messages from other configured Matrix bot accounts in allowed rooms and DMs.allowBots: "mentions"accepts those messages only when they visibly mention this bot in rooms. DMs are still allowed.groups.<room>.allowBotsoverrides the account-level setting for one room.- OpenClaw still ignores messages from the same Matrix user ID to avoid self-reply loops.
- Matrix does not expose a native bot flag here; OpenClaw treats “bot-authored” as “sent by another configured Matrix account on this OpenClaw gateway”.
Encryption and verification
In encrypted (E2EE) rooms, outbound image events usethumbnail_file so image previews are encrypted alongside the full attachment. Unencrypted rooms still use plain thumbnail_url. No configuration is needed — the plugin detects E2EE state automatically.
All openclaw matrix commands accept --verbose (full diagnostics), --json (machine-readable output), and --account <id> (multi-account setups). Output is concise by default with quiet internal SDK logging. The examples below show the canonical form; add the flags as needed.
Enable encryption
--recovery-key <key>apply a recovery key before bootstrapping (prefer the stdin form documented below)--force-reset-cross-signingdiscard the current cross-signing identity and create a new one (use only intentionally)
--encryption is an alias for --enable-e2ee.
Manual config equivalent:
Status and trust signals
verify status reports three independent trust signals (--verbose shows all of them):
Locally trusted: trusted by this client onlyCross-signing verified: the SDK reports verification via cross-signingSigned by owner: signed by your own self-signing key (diagnostic only)
Verified by owner becomes yes only when Cross-signing verified is yes. Local trust or an owner signature alone is not enough.
--allow-degraded-local-state returns best-effort diagnostics without preparing the Matrix account first; useful for offline or partially-configured probes.
Verify this device with a recovery key
The recovery key is sensitive — pipe it via stdin instead of passing it on the command line. SetMATRIX_RECOVERY_KEY (or MATRIX_<ID>_RECOVERY_KEY for a named account):
Recovery key accepted: Matrix accepted the key for secret storage or device trust.Backup usable: room-key backup can be loaded with the trusted recovery material.Device verified by owner: this device has full Matrix cross-signing identity trust.
verify self waits for Cross-signing verified: yes before it exits successfully. Use --timeout-ms <ms> to tune the wait.
The literal-key form openclaw matrix verify device "<recovery-key>" is also accepted, but the key ends up in your shell history.
Bootstrap or repair cross-signing
verify bootstrap is the repair and setup command for encrypted accounts. In order, it:
- bootstraps secret storage, reusing an existing recovery key when possible
- bootstraps cross-signing and uploads missing public keys
- marks and cross-signs the current device
- creates a server-side room-key backup if one does not already exist
m.login.dummy, then m.login.password (requires channels.matrix.password).
Useful flags:
--recovery-key-stdin(pair withprintf '%s\n' "$MATRIX_RECOVERY_KEY" | …) or--recovery-key <key>--force-reset-cross-signingto discard the current cross-signing identity (intentional only)
Room-key backup
backup status shows whether a server-side backup exists and whether this device can decrypt it. backup restore imports backed-up room keys into the local crypto store; if the recovery key is already on disk you can omit --recovery-key-stdin.
To replace a broken backup with a fresh baseline (accepts losing unrecoverable old history; can also recreate secret storage if the current backup secret is unloadable):
--rotate-recovery-key only when you intentionally want the previous recovery key to stop unlocking the fresh backup baseline.
Listing, requesting, and responding to verifications
--own-user requests self-verification (you accept the prompt in another Matrix client of the same user); --user-id/--device-id/--room-id target someone else. --own-user cannot be combined with the other targeting flags.
For lower-level lifecycle handling — typically while shadowing inbound requests from another client — these commands act on a specific request <id> (printed by verify list and verify request):
| Command | Purpose |
|---|---|
openclaw matrix verify accept <id> | Accept an inbound request |
openclaw matrix verify start <id> | Start the SAS flow |
openclaw matrix verify sas <id> | Print the SAS emoji or decimals |
openclaw matrix verify confirm-sas <id> | Confirm that the SAS matches what the other client shows |
openclaw matrix verify mismatch-sas <id> | Reject the SAS when the emoji or decimals do not match |
openclaw matrix verify cancel <id> | Cancel; takes optional --reason <text> and --code <matrix-code> |
accept, start, sas, confirm-sas, mismatch-sas, and cancel all accept --user-id and --room-id as DM follow-up hints when the verification is anchored to a specific direct-message room.
Multi-account notes
Without--account <id>, Matrix CLI commands use the implicit default account. If you have multiple named accounts and have not set channels.matrix.defaultAccount, they will refuse to guess and ask you to choose. When E2EE is disabled or unavailable for a named account, errors point at that account’s config key, for example channels.matrix.accounts.assistant.encryption.
Startup behavior
Startup behavior
With
encryption: true, startupVerification defaults to "if-unverified". On startup an unverified device requests self-verification in another Matrix client, skipping duplicates and applying a cooldown (24 hours by default). Tune with startupVerificationCooldownHours or disable with startupVerification: "off".Startup also runs a conservative crypto bootstrap pass that reuses the current secret storage and cross-signing identity. If bootstrap state is broken, OpenClaw attempts a guarded repair even without channels.matrix.password; if the homeserver requires password UIA, startup logs a warning and stays non-fatal. Already-owner-signed devices are preserved.See Matrix migration for the full upgrade flow.Verification notices
Verification notices
Matrix posts verification lifecycle notices into the strict DM verification room as
m.notice messages: request, ready (with “Verify by emoji” guidance), start/completion, and SAS (emoji/decimal) details when available.Incoming requests from another Matrix client are tracked and auto-accepted. For self-verification, OpenClaw starts the SAS flow automatically and confirms its own side once emoji verification is available — you still need to compare and confirm “They match” in your Matrix client.Verification system notices are not forwarded to the agent chat pipeline.Deleted or invalid Matrix device
Deleted or invalid Matrix device
If For token auth, create a fresh access token in your Matrix client or admin UI, then update OpenClaw:Replace
verify status says the current device is no longer listed on the homeserver, create a new OpenClaw Matrix device. For password login:assistant with the account ID from the failed command, or omit --account for the default account.Device hygiene
Device hygiene
Old OpenClaw-managed devices can accumulate. List and prune:
Crypto store
Crypto store
Matrix E2EE uses the official
matrix-js-sdk Rust crypto path with fake-indexeddb as the IndexedDB shim. Crypto state persists to crypto-idb-snapshot.json (restrictive file permissions).Encrypted runtime state lives under ~/.openclaw/matrix/accounts/<account>/<homeserver>__<user>/<token-hash>/ and includes the sync store, crypto store, recovery key, IDB snapshot, thread bindings, and startup verification state. When the token changes but the account identity stays the same, OpenClaw reuses the best existing root so prior state remains visible.Profile management
Update the Matrix self-profile for the selected account:mxc:// avatar URLs directly; when you pass http:// or https://, OpenClaw uploads the file first and stores the resolved mxc:// URL into channels.matrix.avatarUrl (or the per-account override).
Threads
Matrix supports native Matrix threads for both automatic replies and message-tool sends. Two independent knobs control behavior:Session routing (sessionScope)
dm.sessionScope decides how Matrix DM rooms map to OpenClaw sessions:
"per-user"(default): all DM rooms with the same routed peer share one session."per-room": each Matrix DM room gets its own session key, even when the peer is the same.
sessionScope, so bound rooms and threads keep their chosen target session.
Reply threading (threadReplies)
threadReplies decides where the bot posts its reply:
"off": replies are top-level. Inbound threaded messages stay on the parent session."inbound": reply inside a thread only when the inbound message was already in that thread."always": reply inside a thread rooted at the triggering message; that conversation is routed through a matching thread-scoped session from the first trigger onward.
dm.threadReplies overrides this for DMs only — for example, keep room threads isolated while keeping DMs flat.
Thread inheritance and slash commands
- Inbound threaded messages include the thread root message as extra agent context.
- Message-tool sends auto-inherit the current Matrix thread when targeting the same room (or the same DM user target), unless an explicit
threadIdis provided. - DM user-target reuse only kicks in when the current session metadata proves the same DM peer on the same Matrix account; otherwise OpenClaw falls back to normal user-scoped routing.
/focus,/unfocus,/agents,/session idle,/session max-age, and thread-bound/acp spawnall work in Matrix rooms and DMs.- Top-level
/focuscreates a new Matrix thread and binds it to the target session whenthreadBindings.spawnSubagentSessions: true. - Running
/focusor/acp spawn --thread hereinside an existing Matrix thread binds that thread in place.
m.notice in that room pointing to the /focus escape hatch and suggesting a dm.sessionScope change. The notice only appears when thread bindings are enabled.
ACP conversation bindings
Matrix rooms, DMs, and existing Matrix threads can be turned into durable ACP workspaces without changing the chat surface. Fast operator flow:- Run
/acp spawn codex --bind hereinside the Matrix DM, room, or existing thread you want to keep using. - In a top-level Matrix DM or room, the current DM/room stays the chat surface and future messages route to the spawned ACP session.
- Inside an existing Matrix thread,
--bind herebinds that current thread in place. /newand/resetreset the same bound ACP session in place./acp closecloses the ACP session and removes the binding.
--bind heredoes not create a child Matrix thread.threadBindings.spawnAcpSessionsis only required for/acp spawn --thread auto|here, where OpenClaw needs to create or bind a child Matrix thread.
Thread binding config
Matrix inherits global defaults fromsession.threadBindings, and also supports per-channel overrides:
threadBindings.enabledthreadBindings.idleHoursthreadBindings.maxAgeHoursthreadBindings.spawnSubagentSessionsthreadBindings.spawnAcpSessions
- Set
threadBindings.spawnSubagentSessions: trueto allow top-level/focusto create and bind new Matrix threads. - Set
threadBindings.spawnAcpSessions: trueto allow/acp spawn --thread auto|hereto bind ACP sessions to Matrix threads.
Reactions
Matrix supports outbound reactions, inbound reaction notifications, and ack reactions. Outbound reaction tooling is gated bychannels.matrix.actions.reactions:
reactadds a reaction to a Matrix event.reactionslists the current reaction summary for a Matrix event.emoji=""removes the bot’s own reactions on that event.remove: trueremoves only the specified emoji reaction from the bot.
| Setting | Order |
|---|---|
ackReaction | per-account → channel → messages.ackReaction → agent identity emoji fallback |
ackReactionScope | per-account → channel → messages.ackReactionScope → default "group-mentions" |
reactionNotifications | per-account → channel → default "own" |
reactionNotifications: "own" forwards added m.reaction events when they target bot-authored Matrix messages; "off" disables reaction system events. Reaction removals are not synthesized into system events because Matrix surfaces those as redactions, not as standalone m.reaction removals.
History context
channels.matrix.historyLimitcontrols how many recent room messages are included asInboundHistorywhen a Matrix room message triggers the agent. Falls back tomessages.groupChat.historyLimit; if both are unset, the effective default is0. Set0to disable.- Matrix room history is room-only. DMs keep using normal session history.
- Matrix room history is pending-only: OpenClaw buffers room messages that did not trigger a reply yet, then snapshots that window when a mention or other trigger arrives.
- The current trigger message is not included in
InboundHistory; it stays in the main inbound body for that turn. - Retries of the same Matrix event reuse the original history snapshot instead of drifting forward to newer room messages.
Context visibility
Matrix supports the sharedcontextVisibility control for supplemental room context such as fetched reply text, thread roots, and pending history.
contextVisibility: "all"is the default. Supplemental context is kept as received.contextVisibility: "allowlist"filters supplemental context to senders allowed by the active room/user allowlist checks.contextVisibility: "allowlist_quote"behaves likeallowlist, but still keeps one explicit quoted reply.
groupPolicy, groups, groupAllowFrom, and DM policy settings.
DM and room policy
dm.enabled: false:
Direct room repair
If direct-message state drifts out of sync, OpenClaw can end up with stalem.direct mappings that point at old solo rooms instead of the live DM. Inspect the current mapping for a peer:
--account <id> for multi-account setups. The repair flow:
- prefers a strict 1:1 DM that is already mapped in
m.direct - falls back to any currently joined strict 1:1 DM with that user
- creates a fresh direct room and rewrites
m.directif no healthy DM exists
Exec approvals
Matrix can act as a native approval client. Configure underchannels.matrix.execApprovals (or channels.matrix.accounts.<account>.execApprovals for a per-account override):
enabled: deliver approvals through Matrix-native prompts. When unset or"auto", Matrix auto-enables once at least one approver can be resolved. Setfalseto disable explicitly.approvers: Matrix user IDs (@owner:example.org) allowed to approve exec requests. Optional — falls back tochannels.matrix.dm.allowFrom.target: where prompts go."dm"(default) sends to approver DMs;"channel"sends to the originating Matrix room or DM;"both"sends to both.agentFilter/sessionFilter: optional allowlists for which agents/sessions trigger Matrix delivery.
- Exec approvals use
execApprovals.approvers, falling back todm.allowFrom. - Plugin approvals authorize through
dm.allowFromonly.
✅allow once❌deny♾️allow always (when the effective exec policy allows it)
/approve <id> allow-once, /approve <id> allow-always, /approve <id> deny.
Only resolved approvers can approve or deny. Channel delivery for exec approvals includes the command text — only enable channel or both in trusted rooms.
Related: Exec approvals.
Slash commands
Slash commands (/new, /reset, /model, /focus, /unfocus, /agents, /session, /acp, /approve, etc.) work directly in DMs. In rooms, OpenClaw also recognizes commands that are prefixed with the bot’s own Matrix mention, so @bot:server /new triggers the command path without a custom mention regex. This keeps the bot responsive to the room-style @mention /command posts that Element and similar clients emit when a user tab-completes the bot before typing the command.
Authorization rules still apply: command senders must satisfy the same DM or room allowlist/owner policies as plain messages.
Multi-account
- Top-level
channels.matrixvalues act as defaults for named accounts unless an account overrides them. - Scope an inherited room entry to a specific account with
groups.<room>.account. Entries withoutaccountare shared across accounts;account: "default"still works when the default account is configured at the top level.
- Set
defaultAccountto pick the named account that implicit routing, probing, and CLI commands prefer. - If you have multiple accounts and one is literally named
default, OpenClaw uses it implicitly even whendefaultAccountis unset. - If you have multiple named accounts and no default is selected, CLI commands refuse to guess — set
defaultAccountor pass--account <id>. - The top-level
channels.matrix.*block is only treated as the implicitdefaultaccount when its auth is complete (homeserver+accessToken, orhomeserver+userId+password). Named accounts remain discoverable fromhomeserver+userIdonce cached credentials cover auth.
- When OpenClaw promotes a single-account config to multi-account during repair or setup, it preserves the existing named account if one exists or
defaultAccountalready points at one. Only Matrix auth/bootstrap keys move into the promoted account; shared delivery-policy keys stay at the top level.
Private/LAN homeservers
By default, OpenClaw blocks private/internal Matrix homeservers for SSRF protection unless you explicitly opt in per account. If your homeserver runs on localhost, a LAN/Tailscale IP, or an internal hostname, enablenetwork.dangerouslyAllowPrivateNetwork for that Matrix account:
http://matrix.example.org:8008 remain blocked. Prefer https:// whenever possible.
Proxying Matrix traffic
If your Matrix deployment needs an explicit outbound HTTP(S) proxy, setchannels.matrix.proxy:
channels.matrix.accounts.<id>.proxy.
OpenClaw uses the same proxy setting for runtime Matrix traffic and account status probes.
Target resolution
Matrix accepts these target forms anywhere OpenClaw asks you for a room or user target:- Users:
@user:server,user:@user:server, ormatrix:user:@user:server - Rooms:
!room:server,room:!room:server, ormatrix:room:!room:server - Aliases:
#alias:server,channel:#alias:server, ormatrix:channel:#alias:server
- User lookups query the Matrix user directory on that homeserver.
- Room lookups accept explicit room IDs and aliases directly, then fall back to searching joined room names for that account.
- Joined-room name lookup is best-effort. If a room name cannot be resolved to an ID or alias, it is ignored by runtime allowlist resolution.
Configuration reference
Allowlist-style fields (groupAllowFrom, dm.allowFrom, groups.<room>.users) accept full Matrix user IDs (safest). Exact directory matches are resolved at startup and whenever the allowlist changes while the monitor is running; entries that cannot be resolved are ignored at runtime. Room allowlists prefer room IDs or aliases for the same reason.
Account and connection
enabled: enable or disable the channel.name: optional display label for the account.defaultAccount: preferred account ID when multiple Matrix accounts are configured.accounts: named per-account overrides. Top-levelchannels.matrixvalues are inherited as defaults.homeserver: homeserver URL, for examplehttps://matrix.example.org.network.dangerouslyAllowPrivateNetwork: allow this account to connect tolocalhost, LAN/Tailscale IPs, or internal hostnames.proxy: optional HTTP(S) proxy URL for Matrix traffic. Per-account override supported.userId: full Matrix user ID (@bot:example.org).accessToken: access token for token-based auth. Plaintext and SecretRef values supported across env/file/exec providers (Secrets Management).password: password for password-based login. Plaintext and SecretRef values supported.deviceId: explicit Matrix device ID.deviceName: device display name used at password-login time.avatarUrl: stored self-avatar URL for profile sync andprofile setupdates.initialSyncLimit: maximum number of events fetched during startup sync.
Encryption
encryption: enable E2EE. Default:false.startupVerification:"if-unverified"(default when E2EE is on) or"off". Auto-requests self-verification on startup when this device is unverified.startupVerificationCooldownHours: cooldown before the next automatic startup request. Default:24.
Access and policy
groupPolicy:"open","allowlist", or"disabled". Default:"allowlist".groupAllowFrom: allowlist of user IDs for room traffic.dm.enabled: whenfalse, ignore all DMs. Default:true.dm.policy:"pairing"(default),"allowlist","open", or"disabled". Applies after the bot has joined and classified the room as a DM; it does not affect invite handling.dm.allowFrom: allowlist of user IDs for DM traffic.dm.sessionScope:"per-user"(default) or"per-room".dm.threadReplies: DM-only override for reply threading ("off","inbound","always").allowBots: accept messages from other configured Matrix bot accounts (trueor"mentions").allowlistOnly: whentrue, forces all active DM policies (except"disabled") and"open"group policies to"allowlist". Does not change"disabled"policies.autoJoin:"always","allowlist", or"off". Default:"off". Applies to every Matrix invite, including DM-style invites.autoJoinAllowlist: rooms/aliases allowed whenautoJoinis"allowlist". Alias entries are resolved against the homeserver, not against state claimed by the invited room.contextVisibility: supplemental context visibility ("all"default,"allowlist","allowlist_quote").
Reply behavior
replyToMode:"off","first","all", or"batched".threadReplies:"off","inbound", or"always".threadBindings: per-channel overrides for thread-bound session routing and lifecycle.streaming:"off"(default),"partial","quiet", or object form{ mode, preview: { toolProgress } }.true↔"partial",false↔"off".blockStreaming: whentrue, completed assistant blocks are kept as separate progress messages.markdown: optional Markdown rendering config for outbound text.responsePrefix: optional string prepended to outbound replies.textChunkLimit: outbound chunk size in characters whenchunkMode: "length". Default:4000.chunkMode:"length"(default, splits by character count) or"newline"(splits at line boundaries).historyLimit: number of recent room messages included asInboundHistorywhen a room message triggers the agent. Falls back tomessages.groupChat.historyLimit; effective default0(disabled).mediaMaxMb: media size cap in MB for outbound sends and inbound processing.
Reaction settings
ackReaction: ack reaction override for this channel/account.ackReactionScope: scope override ("group-mentions"default,"group-all","direct","all","none","off").reactionNotifications: inbound reaction notification mode ("own"default,"off").
Tooling and per-room overrides
actions: per-action tool gating (messages,reactions,pins,profile,memberInfo,channelInfo,verification).groups: per-room policy map. Session identity uses the stable room ID after resolution. (roomsis a legacy alias.)groups.<room>.account: restrict one inherited room entry to a specific account.groups.<room>.allowBots: per-room override of the channel-level setting (trueor"mentions").groups.<room>.users: per-room sender allowlist.groups.<room>.tools: per-room tool allow/deny overrides.groups.<room>.autoReply: per-room mention-gating override.truedisables mention requirements for that room;falseforces them back on.groups.<room>.skills: per-room skill filter.groups.<room>.systemPrompt: per-room system prompt snippet.
Exec approval settings
execApprovals.enabled: deliver exec approvals through Matrix-native prompts.execApprovals.approvers: Matrix user IDs allowed to approve. Falls back todm.allowFrom.execApprovals.target:"dm"(default),"channel", or"both".execApprovals.agentFilter/execApprovals.sessionFilter: optional agent/session allowlists for delivery.
Related
- Channels Overview — all supported channels
- Pairing — DM authentication and pairing flow
- Groups — group chat behavior and mention gating
- Channel Routing — session routing for messages
- Security — access model and hardening