The open-source dashboard for AI agent orchestration.
Manage agent fleets, track tasks, monitor costs, and orchestrate workflows — all from a single pane of glass.
Alpha Software — Mission Control is under active development. APIs, database schemas, and configuration formats may change between releases. Review the known limitations and security considerations before deploying to production.
Running AI agents at scale means juggling sessions, tasks, costs, and reliability across multiple models and channels. Mission Control gives you:
- 32 panels — Tasks, agents, skills, logs, tokens, memory, security, cron, alerts, webhooks, pipelines, and more
- Real-time everything — WebSocket + SSE push updates, smart polling that pauses when you're away
- Zero external dependencies — SQLite database, single
pnpm startto run, no Redis/Postgres/Docker required - Role-based access — Viewer, operator, and admin roles with session + API key auth
- Quality gates — Built-in Aegis review system that blocks task completion without sign-off
- Recurring tasks — Natural language scheduling ("every morning at 9am") with cron-based template spawning
- Claude Code bridge — Read-only integration surfaces Claude Code team tasks and configs on the dashboard
- Skills Hub — Browse, install, and security-scan agent skills from ClawdHub and skills.sh registries
- Multi-gateway — Connect to multiple agent gateways simultaneously (OpenClaw, and more coming soon)
git clone https://github.com/builderz-labs/mission-control.git
cd mission-control
bash install.sh --dockerThe installer auto-generates secure credentials, starts the container, and runs an OpenClaw fleet health check. Open http://localhost:3000 and log in with the printed credentials.
git clone https://github.com/builderz-labs/mission-control.git
cd mission-control
bash install.sh --localRequires Node.js 22.x (LTS, recommended) or 24.x, and pnpm (auto-installed via corepack if missing).
Requires pnpm and Node.js 22.x (LTS, recommended) or 24.x. Mission Control is validated on Node 22 (primary CI/LTS) and supports Node 24 for local dev and deploys. Use
nvm use 22(ornvm use 24) before installing or starting the app.
git clone https://github.com/builderz-labs/mission-control.git
cd mission-control
nvm use 22 # or: nvm use 24
pnpm install
cp .env.example .env # edit with your values
pnpm dev # http://localhost:3000Initial login is seeded from AUTH_USER / AUTH_PASS on first run.
If AUTH_PASS contains #, quote it (e.g. AUTH_PASS="my#password") or use AUTH_PASS_B64.
Mission Control can run in standalone mode without a gateway connection. This is useful when:
- Deploying on a VPS with firewall rules blocking non-standard WebSocket ports (18789/18790)
- Testing UI/core workflows without a running gateway
- Running Mission Control primarily for project/task operations
Enable with:
NEXT_PUBLIC_GATEWAY_OPTIONAL=trueWhen enabled, the HUD status shows Gateway Optional (Standalone) instead of Disconnected.
Works without gateway:
- Task board, projects, agents, sessions, scheduler, webhooks, alerts, activity/audit, cost tracking
Requires active gateway:
- Real-time session updates
- Agent-to-agent messaging
- Gateway log streaming
For production VPS setups, you can also proxy gateway WebSockets over 443. See docs/deployment.md.
For production deployments, use the hardened compose overlay:
docker compose -f docker-compose.yml -f docker-compose.hardened.yml up -dThis adds read-only filesystem, capability dropping, log rotation, HSTS, and network isolation. See Security Hardening for the full checklist.
Run diagnostics on your installation:
bash scripts/station-doctor.sh
bash scripts/security-audit.sh- Agent management with full lifecycle (register, heartbeat, wake, retire)
- Kanban task board with drag-and-drop, priorities, assignments, and comments
- Real-time monitoring via WebSocket + SSE with smart polling
- Token usage and cost tracking with per-model breakdowns
- Multi-gateway connection management
- Role-based access control (viewer, operator, admin)
- Background scheduler for automated tasks
- Outbound webhooks with delivery history, retry with exponential backoff, and circuit breaker
- Webhook signature verification (HMAC-SHA256 with constant-time comparison)
- Local Claude Code session tracking (auto-discovers from
~/.claude/projects/) - Quality review gates for task sign-off
- Pipeline orchestration with workflow templates
- Ed25519 device identity for secure gateway handshake
- Agent SOUL system with workspace file sync and templates
- Agent inter-agent messaging and comms
- Skills Hub with ClawdHub and skills.sh registry integration (search, install, security scan)
- Bidirectional skill sync — disk ↔ DB with SHA-256 change detection
- Local agent discovery from
~/.agents/,~/.codex/agents/,~/.claude/agents/ - Natural language recurring tasks — schedule parser converts "every 2 hours" to cron, spawns dated child tasks
- Claude Code task bridge — read-only scanner surfaces team tasks and configs from
~/.claude/tasks/and~/.claude/teams/ - Skill security scanner (prompt injection, credential leaks, data exfiltration, obfuscated content)
- Update available banner with GitHub release check and one-click self-update
- Framework adapter layer for multi-agent registration (OpenClaw, CrewAI, LangGraph, AutoGen, Claude SDK, generic)
- Multi-project task organization with per-project ticket prefixes
- Per-agent rate limiting with
x-agent-nameidentity-based quotas - Agent self-registration endpoint for autonomous agent onboarding
- Security audit panel with posture scoring, secret detection, trust scoring, and MCP call auditing
- Four-layer agent eval framework (output, trace, component, drift detection)
- Agent optimization endpoint with token efficiency, tool patterns, and fleet benchmarks
- Hook profiles (minimal/standard/strict) for tunable security strictness
- Guided onboarding wizard with credential setup, agent discovery, and security scan
- No major security limitations currently tracked here for CSP; policy now uses per-request nonces (no
unsafe-inline/unsafe-eval).
- Change all default credentials (
AUTH_USER,AUTH_PASS,API_KEY) before deploying - Deploy behind a reverse proxy with TLS (e.g., Caddy, nginx) for any network-accessible deployment
- Review SECURITY.md for the vulnerability reporting process
- Do not expose the dashboard to the public internet without configuring
MC_ALLOWED_HOSTSand TLS
Monitor agent status, configure models, view heartbeats, and manage the full agent lifecycle from registration to retirement. Agent detail modal with compact overview, inline model selector, and editable sub-agent configuration.
Kanban board with six columns (inbox → assigned → in progress → review → quality review → done), drag-and-drop, priority levels, assignments, threaded comments, and inline sub-agent spawning.
Live activity feed, session inspector, and log viewer with filtering. WebSocket connection to OpenClaw gateway for instant event delivery.
Token usage dashboard with per-model breakdowns, trend charts, and cost analysis powered by Recharts.
Scheduled tasks for database backups, stale record cleanup, agent heartbeat monitoring, and recurring task spawning. Configurable via UI or API.
Create recurring tasks with natural language like "every morning at 9am" or "every 2 hours". The built-in schedule parser (zero dependencies) converts expressions to cron and stores them in task metadata. A template-clone pattern keeps the original task as a template and spawns dated child tasks (e.g., "Daily Report - Mar 07") on schedule. Each spawned task gets its own Aegis quality gate.
Connect Claude Code, Codex, or any CLI tool directly to Mission Control without requiring a gateway. Register connections, send heartbeats with inline token reporting, and auto-register agents.
Automatically discovers and tracks local Claude Code sessions by scanning ~/.claude/projects/. Extracts token usage, model info, message counts, cost estimates, and active status from JSONL transcripts. Scans every 60 seconds via the background scheduler.
Read-only integration that surfaces Claude Code team tasks and team configs on the Mission Control dashboard. Scans ~/.claude/tasks/<team>/<N>.json for structured task data (subject, status, owner, blockers) and ~/.claude/teams/<name>/config.json for team metadata (members, lead agent, model assignments). Visible in both the Task Board (collapsible section) and Cron Management (teams overview) panels.
Inbound sync from GitHub repositories with label and assignee mapping. Synced issues appear on the task board alongside agent-created tasks.
Browse, install, and manage agent skills from local directories and external registries (ClawdHub, skills.sh). Bidirectional sync detects manual additions on disk and pushes UI edits back to SKILL.md files. Built-in security scanner checks for prompt injection, credential leaks, data exfiltration, obfuscated content, and dangerous shell commands before installation. Supports 5 skill roots: ~/.agents/skills, ~/.codex/skills, project-local .agents/skills and .codex/skills, and ~/.openclaw/skills for gateway mode.
Automatically discovers agent definitions from ~/.agents/, ~/.codex/agents/, and ~/.claude/agents/ directories. Detection looks for marker files (AGENT.md, soul.md, identity.md, config.json). Discovered agents sync bidirectionally — edit in the UI and changes write back to disk.
Define agent personality, capabilities, and behavioral guidelines via SOUL markdown files. Edit in the UI or directly in workspace soul.md files — changes sync bidirectionally between disk and database.
Session-threaded inter-agent communication via the comms API (a2a:*, coord:*, session:*) with coordinator inbox support and runtime tool-call visibility in the agent-comms feed.
Explore agent knowledge through the Memory Browser, filesystem-backed memory tree, and interactive relationship graph for sessions, memory chunks, and linked knowledge files.
Guided first-run setup wizard that walks new users through five steps: Welcome (system capabilities detection), Credentials (verify AUTH_PASS and API_KEY strength), Agent Setup (gateway connection or local Claude Code discovery), Security Scan (automated configuration audit with pass/fail checks), and Get Started (quick links to key panels). Automatically appears on first login and can be re-launched from Settings. Progress is persisted per-user so you can resume where you left off.
Dedicated security audit panel with real-time posture scoring (0-100), secret detection across agent messages, MCP tool call auditing, injection attempt tracking, and per-agent trust scores. Hook profiles (minimal/standard/strict) let operators tune security strictness per deployment. Auth failures, rate limit hits, and injection attempts are logged automatically as security events.
Four-layer evaluation stack for agent quality: output evals (task completion scoring against golden datasets), trace evals (convergence scoring — >3.0 indicates looping), component evals (tool reliability with p50/p95/p99 latency from MCP call logs), and drift detection (10% threshold vs 4-week rolling baseline). Manage golden datasets and trigger eval runs via API or UI.
API endpoint agents can call for self-improvement recommendations. Analyzes token efficiency (tokens/task vs fleet average), tool usage patterns (success/failure rates, redundant calls), and generates prioritized recommendations. Fleet benchmarks provide percentile rankings across all agents.
Outbound webhooks with delivery history, configurable alert rules with cooldowns, and multi-gateway connection management. Optional 1Password CLI integration for secret management.
Workspaces (tenant instances) are managed via the /api/super/* API endpoints. Admins can:
- Create new client instances (slug, display name, Linux user, gateway port, plan tier)
- Monitor provisioning jobs and their step-by-step progress
- Decommission tenants with optional cleanup of state directories and Linux users
Each workspace gets its own isolated environment with a dedicated OpenClaw gateway, state directory, and workspace root.
Automatic GitHub release check notifies you when a new version is available, displayed as a banner in the dashboard. Admins can trigger a one-click update directly from the banner — the server runs git pull, pnpm install, and pnpm build, then prompts for a restart. Dirty working trees are rejected, and all updates are logged to the audit trail.
Built-in adapter layer for multi-agent registration across frameworks. Supported adapters: OpenClaw, CrewAI, LangGraph, AutoGen, Claude SDK, and a generic fallback. Each adapter normalizes agent registration, heartbeats, and task reporting to a common interface.
mission-control/
├── src/
│ ├── proxy.ts # Auth gate + CSRF + network access control
│ ├── app/
│ │ ├── page.tsx # SPA shell — routes all panels
│ │ ├── login/page.tsx # Login page
│ │ └── api/ # 101 REST API routes
│ ├── components/
│ │ ├── layout/ # NavRail, HeaderBar, LiveFeed
│ │ ├── dashboard/ # Overview dashboard
│ │ ├── panels/ # 32 feature panels
│ │ └── chat/ # Agent chat UI
│ ├── lib/
│ │ ├── auth.ts # Session + API key auth, RBAC
│ │ ├── db.ts # SQLite (better-sqlite3, WAL mode)
│ │ ├── claude-sessions.ts # Local Claude Code session scanner
│ │ ├── claude-tasks.ts # Claude Code team task/config scanner
│ │ ├── schedule-parser.ts # Natural language → cron expression parser
│ │ ├── recurring-tasks.ts # Recurring task template spawner
│ │ ├── migrations.ts # 39 schema migrations
│ │ ├── scheduler.ts # Background task scheduler
│ │ ├── webhooks.ts # Outbound webhook delivery
│ │ ├── websocket.ts # Gateway WebSocket client
│ │ ├── device-identity.ts # Ed25519 device identity for gateway auth
│ │ ├── agent-sync.ts # OpenClaw config → MC database sync
│ │ ├── skill-sync.ts # Bidirectional disk ↔ DB skill sync
│ │ ├── skill-registry.ts # ClawdHub + skills.sh registry client & security scanner
│ │ ├── local-agent-sync.ts # Local agent discovery from ~/.agents, ~/.codex, ~/.claude
│ │ ├── secret-scanner.ts # Regex-based secret detection (AWS, GitHub, Stripe, JWT, PEM, DB URIs)
│ │ ├── security-events.ts # Security event logger + agent trust scoring
│ │ ├── mcp-audit.ts # MCP tool call auditing
│ │ ├── agent-evals.ts # Four-layer agent eval framework
│ │ ├── agent-optimizer.ts # Agent optimization engine
│ │ ├── hook-profiles.ts # Security strictness profiles (minimal/standard/strict)
│ │ └── adapters/ # Framework adapters (openclaw, crewai, langgraph, autogen, claude-sdk, generic)
│ └── store/index.ts # Zustand state management
└── .data/ # Runtime data (SQLite DB, token logs)
| Layer | Technology |
|---|---|
| Framework | Next.js 16 (App Router) |
| UI | React 19, Tailwind CSS 3.4 |
| Language | TypeScript 5.7 |
| Database | SQLite via better-sqlite3 (WAL mode) |
| State | Zustand 5 |
| Charts | Recharts 3 |
| Real-time | WebSocket + Server-Sent Events |
| Auth | scrypt hashing, session tokens, RBAC |
| Validation | Zod 4 |
| Testing | Vitest (282 unit) + Playwright (295 E2E) |
Three auth methods, three roles:
| Method | Details |
|---|---|
| Session cookie | POST /api/auth/login sets __Host-mc-session (7-day expiry) for HTTPS, mc-session for HTTP |
| API key | x-api-key header matches API_KEY env var |
| Google Sign-In | OAuth with admin approval workflow |
| Role | Access |
|---|---|
viewer |
Read-only |
operator |
Read + write (tasks, agents, chat) |
admin |
Full access (users, settings, system ops) |
All endpoints require authentication unless noted. Full reference below.
Auth
| Method | Path | Description |
|---|---|---|
POST |
/api/auth/login |
Login with username/password |
POST |
/api/auth/google |
Google Sign-In |
POST |
/api/auth/logout |
Destroy session |
GET |
/api/auth/me |
Current user info |
GET |
/api/auth/access-requests |
List pending access requests (admin) |
POST |
/api/auth/access-requests |
Approve/reject requests (admin) |
Core Resources
| Method | Path | Role | Description |
|---|---|---|---|
GET |
/api/agents |
viewer | List agents with task stats |
POST |
/api/agents |
operator | Register/update agent |
GET |
/api/agents/[id] |
viewer | Agent details |
GET |
/api/agents/[id]/attribution |
viewer | Self-scope attribution/audit/cost report (?privileged=1 admin override) |
POST |
/api/agents/sync |
operator | Sync agents from openclaw.json or local disk (?source=local) |
POST |
/api/agents/register |
viewer | Agent self-registration (idempotent, rate-limited) |
GET/POST |
/api/adapters |
viewer/operator | List adapters / Framework-agnostic agent action dispatch |
GET/PUT |
/api/agents/[id]/soul |
operator | Agent SOUL content (reads from workspace, writes to both) |
GET/POST |
/api/agents/comms |
operator | Agent inter-agent communication |
POST |
/api/agents/message |
operator | Send message to agent |
GET |
/api/tasks |
viewer | List tasks (filter: ?status=, ?assigned_to=, ?priority=) |
POST |
/api/tasks |
operator | Create task |
GET |
/api/tasks/queue |
operator | Poll next task for an agent (?agent=, optional ?max_capacity=) |
GET |
/api/tasks/[id] |
viewer | Task details |
PUT |
/api/tasks/[id] |
operator | Update task |
DELETE |
/api/tasks/[id] |
admin | Delete task |
GET |
/api/tasks/[id]/comments |
viewer | Task comments |
POST |
/api/tasks/[id]/comments |
operator | Add comment |
POST |
/api/tasks/[id]/broadcast |
operator | Broadcast task to agents |
- Self-scope by default: requester identity must match target agent via
x-agent-name(or matching authenticated username). - Admin override requires explicit
?privileged=1. - Query params:
hours: integer window1..720(default24)section: comma-separated subset ofidentity,audit,mutations,cost(default all)
Security & Evals
| Method | Path | Role | Description |
|---|---|---|---|
GET |
/api/security-audit |
admin | Security posture, events, trust scores, MCP audit (?timeframe=day) |
GET |
/api/security-scan |
admin | Static security configuration scan |
GET |
/api/agents/optimize |
operator | Agent optimization recommendations (?agent=&hours=24) |
GET |
/api/agents/evals |
operator | Agent eval results (?agent=, ?action=history&weeks=4) |
POST |
/api/agents/evals |
operator | Trigger eval run (action: 'run') or manage golden datasets (action: 'golden-set') |
Monitoring
| Method | Path | Role | Description |
|---|---|---|---|
GET |
/api/status |
viewer | System status (uptime, memory, disk) |
GET |
/api/activities |
viewer | Activity feed |
GET |
/api/notifications |
viewer | Notifications for recipient |
GET |
/api/sessions |
viewer | Active gateway sessions |
GET |
/api/tokens |
viewer | Token usage and cost data |
GET |
/api/standup |
viewer | Standup report history |
POST |
/api/standup |
operator | Generate standup |
GET |
/api/releases/check |
viewer | Check for new GitHub releases |
Configuration
| Method | Path | Role | Description |
|---|---|---|---|
GET/PUT |
/api/settings |
admin | App settings |
GET/PUT |
/api/gateway-config |
admin | OpenClaw gateway config |
GET/POST |
/api/cron |
admin | Cron management |
GET/POST |
/api/onboarding |
viewer | Onboarding wizard state and step progression |
Operations
| Method | Path | Role | Description |
|---|---|---|---|
GET/POST |
/api/scheduler |
admin | Background task scheduler |
GET |
/api/audit |
admin | Audit log |
GET |
/api/logs |
viewer | Agent log browser |
GET |
/api/memory |
viewer | Memory file browser/search |
GET |
/api/search |
viewer | Global search |
GET |
/api/export |
admin | CSV export |
POST |
/api/backup |
admin | Database backup |
POST |
/api/cleanup |
admin | Stale data cleanup |
Integrations
| Method | Path | Role | Description |
|---|---|---|---|
GET/POST/PUT/DELETE |
/api/webhooks |
admin | Webhook CRUD |
POST |
/api/webhooks/test |
admin | Test delivery |
POST |
/api/webhooks/retry |
admin | Manual retry a failed delivery |
GET |
/api/webhooks/verify-docs |
viewer | Signature verification docs |
GET |
/api/webhooks/deliveries |
admin | Delivery history |
GET/POST/PUT/DELETE |
/api/alerts |
admin | Alert rules |
GET/POST/PUT/DELETE |
/api/gateways |
admin | Gateway connections |
POST |
/api/gateways/connect |
operator | Resolve websocket URL + token for selected gateway |
GET/PUT/DELETE/POST |
/api/integrations |
admin | Integration management |
POST |
/api/github |
admin | Trigger GitHub Issues sync |
Workspace/Tenant Management
| Method | Path | Role | Description |
|---|---|---|---|
GET |
/api/super/tenants |
admin | List all tenants with latest provisioning status |
POST |
/api/super/tenants |
admin | Create tenant and queue bootstrap job |
POST |
/api/super/tenants/[id]/decommission |
admin | Queue tenant decommission job |
GET |
/api/super/provision-jobs |
admin | List provisioning jobs (filter: ?tenant_id=, ?status=) |
POST |
/api/super/provision-jobs |
admin | Queue additional job for existing tenant |
POST |
/api/super/provision-jobs/[id]/action |
admin | Approve, reject, or cancel a provisioning job |
Skills
| Method | Path | Role | Description |
|---|---|---|---|
GET |
/api/skills |
viewer | List skills (DB-backed with filesystem fallback) |
GET |
/api/skills?mode=content&source=…&name=… |
viewer | Read SKILL.md content with inline security report |
GET |
/api/skills?mode=check&source=…&name=… |
viewer | On-demand security scan |
POST |
/api/skills |
operator | Create skill |
PUT |
/api/skills |
operator | Update skill content |
DELETE |
/api/skills |
operator | Delete skill |
GET |
/api/skills/registry?source=…&q=… |
viewer | Search external registry (ClawdHub, skills.sh) |
POST |
/api/skills/registry |
admin | Install skill from registry |
PUT |
/api/skills/registry |
viewer | Security-check content without installing |
Direct CLI
| Method | Path | Role | Description |
|---|---|---|---|
POST |
/api/connect |
operator | Register direct CLI connection |
GET |
/api/connect |
viewer | List active connections |
DELETE |
/api/connect |
operator | Disconnect CLI session |
Chat & Real-time
| Method | Path | Description |
|---|---|---|
GET |
/api/events |
SSE stream of DB changes |
GET/POST |
/api/chat/conversations |
Conversation CRUD |
GET/POST |
/api/chat/messages |
Message CRUD |
Agent Lifecycle
| Method | Path | Role | Description |
|---|---|---|---|
POST |
/api/spawn |
operator | Spawn agent session |
POST |
/api/agents/[id]/heartbeat |
operator | Agent heartbeat |
POST |
/api/agents/[id]/wake |
operator | Wake sleeping agent |
POST |
/api/quality-review |
operator | Submit quality review |
Claude Code Sessions
| Method | Path | Role | Description |
|---|---|---|---|
GET |
/api/claude/sessions |
viewer | List discovered sessions (filter: ?active=1, ?project=) |
POST |
/api/claude/sessions |
operator | Trigger manual session scan |
GET |
/api/claude-tasks |
viewer | List Claude Code team tasks and configs (?force=true to bypass cache) |
GET |
/api/schedule-parse |
viewer | Parse natural language schedule (?input=every+2+hours) |
Pipelines
| Method | Path | Role | Description |
|---|---|---|---|
GET |
/api/pipelines |
viewer | List pipeline runs |
POST |
/api/pipelines/run |
operator | Start pipeline |
GET/POST |
/api/workflows |
viewer/admin | Workflow templates |
See .env.example for the complete list. Key variables:
| Variable | Required | Description |
|---|---|---|
AUTH_USER |
No | Initial admin username (default: admin) |
AUTH_PASS |
No | Initial admin password |
AUTH_PASS_B64 |
No | Base64-encoded admin password (overrides AUTH_PASS if set) |
API_KEY |
No | API key for headless access |
OPENCLAW_CONFIG_PATH |
Yes* | Absolute path to openclaw.json (preferred) |
OPENCLAW_STATE_DIR |
Yes* | OpenClaw state root (default: ~/.openclaw) |
OPENCLAW_HOME |
No | Legacy alias for state dir (fallback if OPENCLAW_STATE_DIR unset) |
OPENCLAW_GATEWAY_HOST |
No | Gateway host (default: 127.0.0.1) |
OPENCLAW_GATEWAY_PORT |
No | Gateway WebSocket port (default: 18789) |
OPENCLAW_GATEWAY_TOKEN |
No | Server-side gateway auth token |
OPENCLAW_TOOLS_PROFILE |
No | Tools profile for sessions_spawn (recommended: coding) |
NEXT_PUBLIC_GATEWAY_TOKEN |
No | Browser-side gateway auth token (must use NEXT_PUBLIC_ prefix) |
NEXT_PUBLIC_GATEWAY_CLIENT_ID |
No | Gateway UI client ID for websocket handshake (default: openclaw-control-ui) |
OPENCLAW_MEMORY_DIR |
No | Memory browser root (see note below) |
MC_CLAUDE_HOME |
No | Path to ~/.claude directory (default: ~/.claude) |
MC_TRUSTED_PROXIES |
No | Comma-separated trusted proxy IPs for XFF parsing |
MC_ALLOWED_HOSTS |
No | Host allowlist for production |
*Memory browser, log viewer, and gateway config require OpenClaw config/state resolution (OPENCLAW_CONFIG_PATH and/or OPENCLAW_STATE_DIR).
Memory Browser note: OpenClaw does not store agent memory markdown files under
$OPENCLAW_STATE_DIR/memory/— that directory does not exist by default. Agent memory lives in each agent's workspace (e.g.~/clawd-agents/{agent}/memory/). SetOPENCLAW_MEMORY_DIRto your agents root directory to make the Memory Browser show daily logs,MEMORY.md, and other markdown files:OPENCLAW_MEMORY_DIR=/home/you/clawd-agents
To add a new workspace/client instance, use the /api/super/tenants endpoint or the Workspaces panel (if enabled):
- Provide tenant/workspace fields (
slug,display_name, optional ports/gateway owner). - The system queues a bootstrap provisioning job.
- Approve/run the provisioning job via
/api/super/provision-jobs/[id]/action.
Mission Control supports multi-project task organization per workspace:
- Create/manage projects via Task Board →
Projects. - Each project has its own ticket prefix and counter.
- New tasks receive project-scoped ticket refs like
PA-001,PA-002. - Task board supports filtering by project.
- Agent profile → Memory tab: per-agent working memory stored in Mission Control DB (
working_memory). - Memory Browser page: workspace/local filesystem memory tree under
OPENCLAW_MEMORY_DIR.
# Build
pnpm install --frozen-lockfile
pnpm build
# Run
OPENCLAW_CONFIG_PATH=/path/to/.openclaw/openclaw.json OPENCLAW_STATE_DIR=/path/to/.openclaw pnpm startNetwork access is restricted by default in production. Set MC_ALLOWED_HOSTS (comma-separated) or MC_ALLOW_ANY_HOST=1 to control access.
pnpm dev # Dev server
pnpm build # Production build
pnpm typecheck # TypeScript check
pnpm lint # ESLint
pnpm test # Vitest unit tests
pnpm test:e2e # Playwright E2E
pnpm quality:gate # All checksGET /api/workload returns a workload snapshot and one recommendation:
normal: system healthy, submit freelythrottle: reduce submission rate / defer non-critical workshed: submit only critical workpause: hold submissions until capacity returns
Low-signal behavior:
capacity.error_rate_5mis clamped to[0,1]queue.estimated_wait_confidenceiscalculatedorunknown- queue breakdown maps include stable keys even when counts are zero
Runtime-tunable thresholds:
MC_WORKLOAD_QUEUE_DEPTH_NORMALMC_WORKLOAD_QUEUE_DEPTH_THROTTLEMC_WORKLOAD_QUEUE_DEPTH_SHEDMC_WORKLOAD_BUSY_RATIO_THROTTLEMC_WORKLOAD_BUSY_RATIO_SHEDMC_WORKLOAD_ERROR_RATE_THROTTLEMC_WORKLOAD_ERROR_RATE_SHEDMC_WORKLOAD_RECENT_WINDOW_SECONDS
GET /api/agents/{id}/diagnostics is self-scoped by default.
- Self access:
- Session user where
username === agent.name, or - API-key request with
x-agent-namematching{id}agent name
- Session user where
- Cross-agent access:
- Allowed only with explicit
?privileged=1and admin auth
- Allowed only with explicit
- Query validation:
hoursmust be an integer between1and720sectionmust be a comma-separated subset ofsummary,tasks,errors,activity,trends,tokens
Trend alerts in the trends.alerts response are derived from current-vs-previous window comparisons:
warning: error spikes or severe activity dropinfo: throughput drops or potential stall patterns
See open issues for planned work and the v2.0.0 release notes for the latest major release summary.
Completed:
-
Dockerfile and docker-compose.yml (#34)
-
Implement session control actions — monitor/pause/terminate are stub buttons (#35)
-
Dynamic model catalog — replace hardcoded pricing across 3 files (#36)
-
API-wide rate limiting (#37)
-
React error boundaries around panels (#38)
-
Structured logging with pino (#39)
-
Accessibility improvements — WCAG 2.1 AA (#40)
-
HSTS header for TLS deployments (#41)
-
Input validation with zod schemas (#42)
-
Export endpoint row limits (#43)
-
Fill in Vitest unit test stubs with real assertions
-
Direct CLI integration — connect tools like Codex, Claude Code, or custom CLIs directly without requiring a gateway (#61)
-
OpenAPI 3.1 documentation with Scalar UI (#60)
-
GitHub Issues sync — inbound sync with label/assignee mapping (#63)
-
Webhook retry with exponential backoff and circuit breaker
-
Webhook signature verification (HMAC-SHA256 with constant-time comparison)
-
Local Claude Code session tracking — auto-discover sessions from
~/.claude/projects/ -
Rate limiter IP extraction hardening with trusted proxy support
-
Ed25519 device identity for WebSocket challenge-response handshake (#85)
-
Agent SOUL workspace sync — bidirectional sync between
soul.mdfiles and database (#95) -
Update available banner with GitHub release check (#94)
-
Side panel navigation synced with URL routes (#87)
-
Task board SSE wiring, priority enum, and auto-advance (#89)
Up next:
- Workspace isolation for multi-team usage (#75)
- Framework adapter layer — multi-agent registration across OpenClaw, CrewAI, LangGraph, AutoGen, Claude SDK, and generic
- Self-update mechanism — admin-only one-click update with audit logging
- Multi-project task organization with per-project ticket prefixes
- Skills Hub — browse, install, and security-scan skills from ClawdHub and skills.sh registries
- Bidirectional skill sync — disk ↔ DB with SHA-256 change detection (60s scheduler)
- Local agent discovery — auto-detect agents from
~/.agents/,~/.codex/agents/,~/.claude/agents/ - Natural language recurring tasks with cron-based template spawning
- Claude Code task bridge — read-only team task and config integration
- Agent-agnostic gateway support — connect any orchestration framework (OpenClaw, ZeroClaw, OpenFang, NeoBot, IronClaw, etc.), not just OpenClaw
- Flight Deck — native desktop companion app (Tauri v2) with real PTY terminal grid, stall inbox with native OS notifications, and system tray HUD. Currently in private beta.
- First-class per-agent cost breakdowns — dedicated panel with per-agent token usage and spend (currently derivable from per-session data)
- OAuth approval UI improvements
- API token rotation UI
Contributions are welcome. See CONTRIBUTING.md for setup instructions and guidelines.
To report a vulnerability, see SECURITY.md.
If you find this project useful, consider supporting my open-source work.
Solana donations
BYLu8XD8hGDUtdRBWpGWu5HKoiPrWqCxYFSh4oxXuvPg
MIT © 2026 Builderz Labs


