<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Shawn Sammartano</title>
    <description>The latest articles on DEV Community by Shawn Sammartano (@shawnsammartano).</description>
    <link>https://dev.to/shawnsammartano</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3872602%2F72947a03-f0d4-4e28-aa36-1ec3777bdb5d.png</url>
      <title>DEV Community: Shawn Sammartano</title>
      <link>https://dev.to/shawnsammartano</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/shawnsammartano"/>
    <language>en</language>
    <item>
      <title>I Gave OpenClaw a Way to Bi-Directionally Communicate with other AI Tools and a Memory That All of them (10+) Can Read Simultaneously</title>
      <dc:creator>Shawn Sammartano</dc:creator>
      <pubDate>Sat, 25 Apr 2026 00:55:21 +0000</pubDate>
      <link>https://dev.to/shawnsammartano/i-gave-openclaw-a-way-to-communicate-with-other-ai-tools-and-a-memory-that-all-of-them-11-can-3k99</link>
      <guid>https://dev.to/shawnsammartano/i-gave-openclaw-a-way-to-communicate-with-other-ai-tools-and-a-memory-that-all-of-them-11-can-3k99</guid>
      <description>&lt;p&gt;&lt;em&gt;This is a submission for the &lt;a href="https://dev.to/challenges/openclaw-2026-04-16"&gt;OpenClaw Challenge&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F42f1hfv6757mnmluoboj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F42f1hfv6757mnmluoboj.png" alt=" " width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  What I Built
&lt;/h2&gt;

&lt;p&gt;I built a sovereign memory layer that sits underneath OpenClaw and every other AI tool on my machine — and made all of them share the same brain.&lt;br&gt;
The problem: every AI app on my machine had its own memory silo. ChatGPT didn't know what I told Claude. Claude didn't know what I discussed in OpenClaw. OpenClaw didn't know what any of them knew. Each one was a brilliant amnesiac in its own little box.&lt;br&gt;
So I built BubbleFish Nexus — an AGPL-3.0 Go binary that runs as a local daemon, and a TypeScript plugin (@bubblefish/openclaw-nexus) that drops OpenClaw straight into the same memory pool as nine other AI clients:&lt;/p&gt;

&lt;p&gt;Claude Desktop (MCP over stdio)&lt;br&gt;
Claude Code (MCP)&lt;br&gt;
ChatGPT (OAuth 2.1 + PKCE over a Cloudflare tunnel) and WebUI&lt;br&gt;
Perplexity Comet (SSE over the same tunnel)&lt;br&gt;
Claude Web (?key= URL parameter)&lt;br&gt;
OpenClaw (TypeScript ESM plugin in WSL2)&lt;br&gt;
Open WebUI + Ollama (Pipelines)&lt;br&gt;
Cursor (MCP)&lt;br&gt;
Windsurf (MCP)&lt;br&gt;
Cursor&lt;/p&gt;

&lt;p&gt;One daemon. One memory store. Nine transports. Every byte signed by source identity. Every audit entry hash-chained. Survives kill -9 mid-write with zero data loss.&lt;/p&gt;

&lt;p&gt;Then I went further. I forked OpenClaw locally and gave it a JSON-RPC receiver so Claude Desktop can hand OpenClaw a task through Nexus's governed bridge — full agent-to-agent dispatch with policy approval, capability grants, and audit correlation across both sides.&lt;/p&gt;

&lt;p&gt;Repo: github.com/bubblefish-tech/nexus&lt;/p&gt;
&lt;h2&gt;
  
  
  How I Used OpenClaw
&lt;/h2&gt;

&lt;p&gt;Part 1: The plugin — OpenClaw joins the memory pool&lt;br&gt;
OpenClaw's plugin system is delightful. The definePluginEntry + api.registerTool() pattern with &lt;a class="mentioned-user" href="https://dev.to/sinclair"&gt;@sinclair&lt;/a&gt;/typebox schemas meant I could expose Nexus's capabilities to OpenClaw's agent in roughly 200 lines of TypeScript.&lt;/p&gt;

&lt;p&gt;The plugin lives at ~/.openclaw/plugins/bubblefish-nexus/ and registers three tools the OpenClaw agent can call directly:&lt;/p&gt;

&lt;p&gt;typescriptapi.registerTool({&lt;br&gt;
  name: "nexus_write",&lt;br&gt;
  description: "Save a memory to BubbleFish Nexus. " +&lt;br&gt;
               "Memories persist across sessions and are " +&lt;br&gt;
               "accessible from every other connected AI client.",&lt;br&gt;
  parameters: Type.Object({&lt;br&gt;
    content: Type.String(),&lt;br&gt;
    subject: Type.Optional(Type.String()),&lt;br&gt;
    tags:    Type.Optional(Type.Array(Type.String())),&lt;br&gt;
  }),&lt;br&gt;
  required: true,&lt;br&gt;
  handler: async (input) =&amp;gt; {&lt;br&gt;
    return await nexusClient.write(input);&lt;br&gt;
  },&lt;br&gt;
});&lt;/p&gt;

&lt;p&gt;api.registerTool({&lt;br&gt;
  name: "nexus_search",&lt;br&gt;
  description: "Retrieve relevant memories from Nexus. " +&lt;br&gt;
               "Includes memories written by Claude Desktop, " +&lt;br&gt;
               "ChatGPT, Cursor, and any other connected client.",&lt;br&gt;
  parameters: Type.Object({&lt;br&gt;
    q:       Type.String(),&lt;br&gt;
    profile: Type.Optional(Type.Union([&lt;br&gt;
      Type.Literal("wake"),    // sub-millisecond&lt;br&gt;
      Type.Literal("balanced"),&lt;br&gt;
      Type.Literal("deep"),&lt;br&gt;
    ])),&lt;br&gt;
  }),&lt;br&gt;
  required: true,&lt;br&gt;
  handler: async (input) =&amp;gt; {&lt;br&gt;
    return await nexusClient.search(input);&lt;br&gt;
  },&lt;br&gt;
});&lt;/p&gt;

&lt;p&gt;api.registerTool({&lt;br&gt;
  name: "nexus_status",&lt;br&gt;
  description: "Check Nexus daemon health.",&lt;br&gt;
  required: false,  // user must opt in&lt;br&gt;
  handler: async () =&amp;gt; await nexusClient.status(),&lt;br&gt;
});&lt;br&gt;
Configuration is three environment variables in openclaw.json:&lt;br&gt;
json{&lt;br&gt;
  "env": {&lt;br&gt;
    "NEXUS_URL":      "&lt;a href="http://172.30.80.1:8080" rel="noopener noreferrer"&gt;http://172.30.80.1:8080&lt;/a&gt;",&lt;br&gt;
    "NEXUS_DATA_KEY": "bfn_data_…",&lt;br&gt;
    "NEXUS_SOURCE":   "openclaw"&lt;br&gt;
  }&lt;br&gt;
}&lt;/p&gt;

&lt;p&gt;The non-obvious part was the WSL2 networking. OpenClaw runs in WSL2; Nexus runs natively on Windows. WSL2 can't reach localhost:8080 on the host, so I:&lt;/p&gt;

&lt;p&gt;Rebound Nexus's HTTP API from 127.0.0.1:8080 to 0.0.0.0:8080&lt;br&gt;
Set up a netsh port proxy on the Windows side at port 18080&lt;br&gt;
Pulled the WSL2 default-gateway IP from /etc/resolv.conf for the plugin's NEXUS_URL&lt;/p&gt;

&lt;p&gt;After that, OpenClaw is a peer in the pool. Anything OpenClaw writes is searchable from every other client. Anything those clients wrote is searchable from OpenClaw.&lt;/p&gt;

&lt;p&gt;Part 2: Bi-directional — Claude Desktop hands OpenClaw a task&lt;br&gt;
Reading shared memory is half the trick. The other half is commanding across vendors.&lt;/p&gt;

&lt;p&gt;I added a small JSON-RPC receiver to my local OpenClaw fork that speaks A2A v1.0, plus a Nexus-specific extension at the namespace sh.bubblefish.nexus.governance/v1. Now from Claude Desktop, I can do this:&lt;/p&gt;

&lt;p&gt;"Ask OpenClaw to send a Signal message to my wife saying I'll be late for dinner."&lt;/p&gt;

&lt;p&gt;Here's what actually happens:&lt;/p&gt;

&lt;p&gt;Claude Desktop calls Nexus's MCP bridge tool a2a_send_to_agent with agent=openclaw, skill=send_signal_message, input={…}.&lt;/p&gt;

&lt;p&gt;Nexus's policy engine evaluates the request against the grant table — does client_claude_desktop have capability signal.send on agent openclaw? It does (I granted it once via the consent UI).&lt;/p&gt;

&lt;p&gt;Nexus dispatches a JSON-RPC tasks.send to OpenClaw's receiver over its HTTP transport. The envelope carries the governance extension with the Nexus instance ID, audit ID, and the policy decision.&lt;br&gt;
OpenClaw validates the message, writes the task to its WAL-backed task store as state=working, and invokes the existing Signal channel skill — completely untouched OpenClaw code.&lt;/p&gt;

&lt;p&gt;Signal sends. OpenClaw transitions the task to completed, writes an artifact with the message ID, and echoes a localAuditId back to Nexus.&lt;br&gt;
Nexus chains both audit IDs into its hash-chained log and returns the result up to Claude Desktop.&lt;/p&gt;

&lt;p&gt;End-to-end on a fresh dev machine: under three seconds, with full cryptographic correlation across two AI vendors and one channel provider. No human-in-the-middle for already-granted capabilities. A confirmation prompt for ungranted ones.&lt;/p&gt;

&lt;p&gt;In the video examples I included below I ask Claude to tell Openclaw to create a file, you can see when it hit's the daemon.  I hit F5 to refresh the folder and the file appeared.  In the second video, I had 9 AI tools with a mixture of the desktop apps which routed through cloud to Nexus on my computer via secure tunnel, and local AI tools that connected in various ways to Nexus.  Openclaw was able to retrieve ther message.&lt;/p&gt;

&lt;p&gt;The transport layer supports four modes — stdio (subprocess), http (loopback), tunnel (Cloudflare-fronted for cross-machine), and wsl (the special case for OpenClaw-in-WSL2 dispatched from Windows-native Nexus). All four pass the same end-to-end integration test.&lt;/p&gt;

&lt;p&gt;Part 3: The cryptography that ties it together&lt;br&gt;
Every memory written through the plugin — by OpenClaw or any other client — carries:&lt;/p&gt;

&lt;p&gt;Source signing: an Ed25519 signature with a per-source private key, so we can prove which client wrote what&lt;br&gt;
Hash-chained audit: each write appends to a SHA-256 chain; tampering with any earlier entry invalidates everything after it&lt;br&gt;
Daily Merkle root: at midnight UTC, all chains roll up to one root, which gets externally anchored&lt;br&gt;
WAL-backed durability: the daemon survives kill -9 mid-write with zero data loss&lt;/p&gt;
&lt;h2&gt;
  
  
  Demo
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://bubblefish.sh/Demos/2026.04.15_Claude_Code_To_OpenClaw_Through_Nexus.mp4" rel="noopener noreferrer"&gt;2026.04.15_Claude_Code_To_OpenClaw_Through_Nexus.mp4&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.bubblefish.sh/demos/2026.04.10%20-%20BubbleFish-Nexus%20-%20All%20The%20Things_Video.mp4" rel="noopener noreferrer"&gt;2026.04.10%20-%20BubbleFish-Nexus%20-%20All%20The%20Things_Video.mp4&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.bubblefish.sh/demos/VID_20260406_201031.mp4" rel="noopener noreferrer"&gt;VID_20260406_201031.mp4&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.bubblefish.sh/demos/VID_20260406_201026.mp4" rel="noopener noreferrer"&gt;VID_20260406_201026.mp4&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  What I Learned
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;OpenClaw's plugin model is the right shape.&lt;/strong&gt; The decision to hand the agent a typed tool surface — instead of forcing every integration to be a chat-message hack — is what made the entire Nexus integration possible in 200 lines of TypeScript. Most "personal AI" platforms make you fight the framework before you can extend it. OpenClaw doesn't.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;WSL2 networking will eat a day if you're not careful.&lt;/strong&gt; Mirrored networking mode (Windows 11) and NAT mode have different gateway IPs and different reachability stories. The pattern that worked: Nexus binds 0.0.0.0, Windows runs a netsh port proxy, OpenClaw reads the host IP from /etc/resolv.conf at startup. Document it in your plugin SETUP.md or your users will fight the same fight.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Memory across vendors changes the texture of the assistant relationship.&lt;/strong&gt; Once OpenClaw, Claude Desktop, and ChatGPT all read the same brain, the difference between them collapses to capability, not recall. ChatGPT is the one with browsing. OpenClaw is the one with skills and cron. Claude is the one with deep code reasoning. They stop being three separate products and start being three lobes of one assistant. That's the actual user experience, and it only shows up when you wire them all to one sovereign store.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cross-vendor command needs governance built in from line one.&lt;/strong&gt; &lt;br&gt;
I almost shipped the A2A receiver without policy enforcement, "we'll add it later." Then I sketched what an unscoped grant would let an autonomous agent do across vendors and immediately backed up. Capability grants, two-step consent for ALL-scope, per-tool revocation, and audit correlation aren't optional features; they're the price of being allowed to do this at all.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The cryptographic story sells itself once people see one tampering demo.&lt;/strong&gt; The first time a viewer sees sqlite3 mutate a memory and the verifier turn red, they understand the entire architecture in five seconds. Nothing else I could have shipped would land the "this is real infrastructure" point that fast.&lt;/p&gt;

&lt;p&gt;I'll be pushing out Nexus v0.1.3 with a huge addition of features.  Same day I'll make my Openclaw fork (BubbleClaw) available, which I optimized for bi-directional communication and also automatic handshake with Nexus on Github:&lt;/p&gt;


&lt;div class="crayons-card c-embed text-styles text-styles--secondary"&gt;
    &lt;div class="c-embed__content"&gt;
        &lt;div class="c-embed__cover"&gt;
          &lt;a href="https://github.com/bubblefish-tech/" class="c-link align-middle" rel="noopener noreferrer"&gt;
            &lt;img alt="" src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Favatars.githubusercontent.com%2Fu%2F275130379%3Fs%3D280%26v%3D4" height="280" class="m-0" width="280"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="c-embed__body"&gt;
        &lt;h2 class="fs-xl lh-tight"&gt;
          &lt;a href="https://github.com/bubblefish-tech/" rel="noopener noreferrer" class="c-link"&gt;
            BubbleFish Technologies, Inc. · GitHub
          &lt;/a&gt;
        &lt;/h2&gt;
          &lt;p class="truncate-at-3"&gt;
            AI Infrastructure. BubbleFish Technologies, Inc. has one repository available. Follow their code on GitHub.
          &lt;/p&gt;
        &lt;div class="color-secondary fs-s flex items-center"&gt;
            &lt;img alt="favicon" class="c-embed__favicon m-0 mr-2 radius-0" src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fgithub.githubassets.com%2Ffavicons%2Ffavicon.svg" width="32" height="32"&gt;
          github.com
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;


&lt;h2&gt;
  
  
  ClawCon Michigan
&lt;/h2&gt;

&lt;p&gt;I didn't make it to Ann Arbor on April 16 — I'm building from the high desert of northern Arizona, and Crisler Center was a longer drive than I could spare with a v0.1.3 ship line in front of me. I followed the live demos and announcements online and the energy of a community converging on personal AI sovereignty was unmistakable.&lt;/p&gt;

&lt;p&gt;If ClawCon comes to the Southwest, or if there's a virtual track for the next event, I'd love to demo this side-by-side with whoever's running the most interesting OpenClaw stack in the room. The whole point of the integration is that OpenClaw doesn't have to be alone, it can be the agent layer for a much bigger personal AI ecosystem. That story belongs in front of the OpenClaw community, not just on Dev.to.&lt;/p&gt;

</description>
      <category>devchallenge</category>
      <category>openclawchallenge</category>
    </item>
    <item>
      <title>I built a crash-safe AI memory daemon that survives kill -9. Here's what it does.</title>
      <dc:creator>Shawn Sammartano</dc:creator>
      <pubDate>Sat, 11 Apr 2026 00:46:04 +0000</pubDate>
      <link>https://dev.to/shawnsammartano/i-built-a-crash-safe-ai-memory-daemon-that-survives-kill-9-heres-what-it-does-8ob</link>
      <guid>https://dev.to/shawnsammartano/i-built-a-crash-safe-ai-memory-daemon-that-survives-kill-9-heres-what-it-does-8ob</guid>
      <description>&lt;p&gt;I told Ollama "I just moved to Austin." Then I opened Claude Desktop and asked "where do I live?" Claude said Austin. I never told Claude anything.&lt;br&gt;
Both apps were reading and writing to the same memory daemon on my machine. That's BubbleFish Nexus. This post is about what it does, why I built it, and what I learned shipping it solo over the past few months.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The problem&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Every AI app keeps its own memory silo. ChatGPT doesn't know what you told Claude. Claude doesn't know what you told Ollama. OpenClaw doesn't know what any of them know. Switch tools and you re-explain everything.&lt;br&gt;
There are hosted memory services that solve this, but they all want your data on their servers. I wanted something different: one daemon you run yourself that any AI client can connect to, with the same memory shared across all of them.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What Nexus is&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A single Go binary. AI clients connect over HTTP, MCP, or OAuth 2.1. Every write goes through the same pipeline — auth, policy check, durable write, queue dispatch, destination commit. Every read goes through a multi-stage retrieval pipeline that combines metadata filtering, semantic search, and time-aware reranking so newer facts outrank older contradictions.&lt;br&gt;
Seven AI clients are verified working today: Claude Desktop, ChatGPT (through a real OAuth 2.1 authorization code flow), Perplexity Comet, Ollama, Open WebUI, OpenClaw, and anything that speaks HTTP.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The crash safety story&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is the part I cared about most. If a memory daemon loses data on a crash, it's worthless. I wanted to be able to kill the process mid-write and have zero data loss.&lt;/p&gt;

&lt;p&gt;I verified this by hand before I put the claim in the README. Wrote real memories, force-killed the process, restarted. Every memory came back with full content. There's a built-in bubblefish demo command that does this automatically with 50 memories — writes them, kills the daemon, restarts, queries, and asserts all 50 are present with zero duplicates. It's also the demo I use when people ask "but does it actually work?"&lt;br&gt;
The architecture is documented at a high level in the README. I'm keeping the deeper internals out of public writeups for now, but the externally observable guarantee is simple: if Nexus returns 200 on a write, that memory is durable. If it returns 429 because the queue is full, the memory is still durable — the destination just hasn't caught up yet. There is no window where data is at risk.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What I learned shipping solo&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The hardest part wasn't any single feature. It was the integration work. Connecting seven different AI clients meant seven different transport protocols, seven different auth models, seven different payload shapes. The real value of Nexus isn't any one of those integrations — it's that they all share one memory backend, so a fact written by one client is immediately visible to the others.&lt;/p&gt;

&lt;p&gt;The second hardest part was getting the testing right. 607 tests across 31 packages, all green under the Go race detector, on Windows. CGO_ENABLED=1 for race testing, pure Go for normal builds. I shipped nothing until every test passed three times in a row.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Try it:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;bashgit clone https://github.com/bubblefish-tech/nexus.git
&lt;span class="nb"&gt;cd &lt;/span&gt;nexus
go build &lt;span class="nt"&gt;-o&lt;/span&gt; bubblefish ./cmd/bubblefish/
./bubblefish &lt;span class="nb"&gt;install&lt;/span&gt; &lt;span class="nt"&gt;--mode&lt;/span&gt; simple
./bubblefish start

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;That's the setup. SQLite backend, single source, auto-generated API key, bound to localhost. The installer prints your key and an example curl command. Or grab a pre-built binary from GitHub Releases — no Go installation required.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Repo&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;AGPL-3.0. Solo dev. Built at my desk in Prescott, Arizona over the past few months with Claude Code as my pair programmer.&lt;/p&gt;

&lt;p&gt;[(&lt;a href="https://github.com/bubblefish-tech/nexus)" rel="noopener noreferrer"&gt;https://github.com/bubblefish-tech/nexus)&lt;/a&gt;]&lt;/p&gt;

&lt;p&gt;Happy to answer questions about the architecture at the level the README covers, or about the integration work for any of the seven AI clients. If you've built anything in this space, I'd love to hear how you approached durability — it's the design constraint I spent the most time on.&lt;/p&gt;

</description>
      <category>go</category>
      <category>ai</category>
      <category>opensource</category>
      <category>showdev</category>
    </item>
  </channel>
</rss>
