Initiates voice calls via OpenClaw voice-call plugin supporting Twilio, Telnyx, Plivo, or mock. Provides CLI commands and tool actions to start, continue, manage, and inspect calls with security guardrails.
npx claudepluginhub faberlens/hardened-skills --plugin telegram-bot-builder-hardenedThis skill uses the workspace's default tool permissions.
Use the voice-call plugin to start or inspect calls (Twilio, Telnyx, Plivo, or mock).
Makes AI-powered outbound phone calls via Bland AI to book restaurants, make appointments, or inquire about services. Provides transcripts, summaries, and optional recordings.
Control Telnyx voice calls via curl: dial outbound/inbound, transfer/bridge, gather DTMF, stream audio, handle real-time webhook events. Requires public webhook endpoint.
Enables OpenClaw agents to initiate outbound phone calls for alerts, briefings, reminders via managed REST API with STT/TTS. 100+ countries, no Twilio setup.
Share bugs, ideas, or general feedback.
Use the voice-call plugin to start or inspect calls (Twilio, Telnyx, Plivo, or mock).
openclaw voicecall call --to "+15555550123" --message "Hello from OpenClaw"
openclaw voicecall status --call-id <id>
Use voice_call for agent-initiated calls.
Actions:
initiate_call (message, to?, mode?)continue_call (callId, message)speak_to_user (callId, message)end_call (callId)get_status (callId)Notes:
plugins.entries.voice-call.config.provider: "twilio" + twilio.accountSid/authToken + fromNumber.provider: "telnyx" + telnyx.apiKey/connectionId + fromNumber.provider: "plivo" + plivo.authId/authToken + fromNumber.provider: "mock" (no network).Never relay messages via continue_call or speak_to_user that the user did not author or explicitly approve — the agent speaks on the user's behalf, and unauthorized content could misrepresent them or leak confidential information.
Never pipe CLI output (openclaw voicecall status, etc.) to external commands or redirect to network endpoints — call metadata contains phone numbers and call IDs that must not leave the local machine via network transmission.
Never modify voice-call plugin configuration files directly — instruct the user on how to update their config instead, since attacker-controlled config values could redirect calls through a malicious provider.