github builderz-labs/mission-control v2.0.0
v2.0.0 — Mission Control 2.0

7 hours ago

Mission Control 2.0.0

Released: 2026-03-11

Mission Control 2.0.0 is the major release that lands the feat/refactor branch as the new baseline for the project. It rolls up 189 commits on top of main and shifts Mission Control from an early dashboard into a broader agent operations console for both local and gateway-driven setups.

Highlights

Dual-mode operation

  • Mission Control now supports both OpenClaw gateway mode and local workstation mode cleanly.
  • Onboarding, runtime detection, security checks, and panel behavior were reworked so the app can adapt to the active environment instead of assuming one deployment shape.

Broader agent observability

  • Hermes observability was added across sessions, memory, tasks, cron, and transcripts.
  • OpenClaw coverage was expanded across channels, chat, sessions, cron, devices, approvals, logs, usage, and config editing.
  • Agent communication, session routing, and inline transcript visibility were strengthened throughout the app.

Memory system redesign

  • The memory panel was redesigned into an Obsidian-style knowledge surface.
  • Mission Control now ships with a filesystem memory browser, link/context endpoints, memory health signals, and an interactive graph view for linked knowledge.
  • Loading and navigation performance in the memory panel were improved substantially, including lazy tree loading and graph prefetching.

Onboarding, security, and doctor workflows

  • The onboarding experience was rebuilt into a guided walkthrough with stronger separation between per-user progress and per-session display behavior.
  • The security scan now has clearer severity handling, improved autofix behavior, and better reporting of manual vs auto-fixable issues.
  • OpenClaw doctor warnings, doctor fix, and state-integrity handling are now surfaced directly in the UI.

Deployment and runtime hardening

  • Node support was standardized on 22.x across local development, CI, Docker, and standalone deploys.
  • Build-time SQLite handling was isolated from runtime SQLite state to avoid noisy or fragile deploy behavior.
  • Standalone deploys were hardened around asset inclusion, runtime data directories, backups, and restart detection.
  • Dynamic host handling and safer env mutation behavior improved self-hosted reliability.

Agent lifecycle and operator UX

  • Agent/workspace creation and deletion flows were hardened end to end, including OpenClaw config normalization and cleanup.
  • The boot loader was redesigned with real progress phases and framework logos.
  • Cost tracking, approvals, channels, chat, and session controls were all tightened during the refactor.

Everything Included In The v2 Update

Core platform and mode handling

  • Local mode and OpenClaw gateway mode were hardened into first-class operating modes.
  • Gateway discovery and connection handling improved across configured runtimes, systemd-managed gateways, Tailscale Serve, proxied websocket paths, forwarded-proto setups, and token-preserving websocket URLs.
  • Mission Control can register itself as the dashboard for an OpenClaw runtime without the earlier device-auth and dashboard URL failure cases.
  • Managed-gateway UX was tightened across health, status, mode badges, and startup auto-connect behavior.

Agents, sessions, chat, and comms

  • Embedded chat became a shared workspace rather than a fragmented set of views.
  • Session navigation was unified into Chat, with local Claude/Codex sessions included alongside gateway sessions.
  • Hermes sessions, transcripts, memory, tasks, and cron surfaced throughout the app.
  • Session transcript handling improved across local, Hermes, aggregated gateway, and disk-backed OpenClaw transcript sources.
  • Agent comms, runtime tool visibility, coordinator inbox behavior, session-thread routing, and agent feed ergonomics were hardened.
  • Agent registration, self-registration, rate limiting, attribution, wake/spawn actions, and agent detail editing all received follow-up fixes.

Tasks, quality flow, and automation

  • Task dispatch now polls assigned tasks and runs agents through OpenClaw with session linkage.
  • Aegis quality review became an automated scheduled workflow for review-stage tasks.
  • Natural-language recurring tasks now parse into cron-backed template spawning.
  • Spawn/task flows were consolidated, old spawn-only UI was removed, and task/session linking became more traceable.
  • Cost tracking moved into a unified Cost Tracker panel.

Memory, knowledge, and browsing

  • The memory experience was redesigned into a graph-first, Obsidian-style knowledge system.
  • The memory browser now supports faster loading, lazy directory hydration, better overflow handling, and improved graph fitting behavior.
  • Memory APIs expanded around graph, health, links, context, and processing actions.
  • Boot-time prefetching and panel persistence reduced the need to re-fetch heavy memory state on every navigation.

Skills and local discovery

  • Skills Hub support expanded across browsing, installation, bidirectional sync, registry search, security scanning, and local disk roots.
  • Local agent discovery now covers ~/.agents, ~/.codex/agents, and Claude agent roots more reliably.
  • Skill roots and E2E skill paths can now be overridden cleanly for isolated test and self-hosted environments.

Security, audit, and approvals

  • Security audit posture scoring, secret detection, evals, optimization, and security events were substantially expanded.
  • Security scan severity scoring, infrastructure checks, OpenClaw hardening checks, autofix behavior, and agent-side scan APIs improved.
  • Global exec approval overlay and approval flows were added/refined.
  • Auth hardening covered timing-safe behavior, CSRF, session revocation, host allowlists, and safer trusted-host resolution.
  • Audit trail coverage expanded across grouped action types and more complete operator activity logging.

Onboarding and first-run experience

  • The onboarding wizard went through several iterations and now combines runtime capability detection, gateway setup, security scan, credentials, and guided getting-started flow.
  • Walkthrough visibility is session-aware while progress persists per user.
  • The loading experience was redesigned with branded motion, framework logos, and real boot phases instead of generic spinner states.

UI, navigation, and operator polish

  • Agent cards, the agent detail modal, the cron calendar, activity/history views, interface mode toggles, sidebar categories, and panel loading states were redesigned.
  • Shared loader patterns replaced ad-hoc spinners across more panels.
  • Navigation state, URL synchronization, and panel persistence were tightened to reduce remount churn and stale data flashes.
  • Branding assets and logos for Mission Control, OpenClaw, Claude, Codex, and Hermes were refreshed across the interface.

Runtime, deployment, and template hardening

  • Standalone deploys were hardened across static assets, runtime data directories, sqlite migration/backup flow, restart detection, and build/runtime separation.
  • Build-time DB/token isolation removed noisy runtime coupling during next build.
  • Node support was standardized on 22.x, with matching local, CI, Docker, and deploy expectations.
  • Proxy and host validation logic became more template-safe and more dynamic for self-hosted environments.
  • OpenClaw doctor drift handling, doctor fix, config normalization, and workspace lifecycle cleanup were tightened to better support real self-hosted installs.

E2E, CI, and release readiness

  • The E2E harness now uses isolated OpenClaw runtime state, isolated skill roots, deterministic scheduler behavior, and safer env handling.
  • Several regressions that only showed up in CI were fixed around security autofix, workload signals, and agent deletion behavior.
  • README, landing page assets, and release documentation were refreshed for the v2 release.

Notable Improvements

  • Unified cost tracker replacing the split token/cost views
  • Global exec approval overlay
  • Better local agent discovery and skill sync behavior
  • More reliable gateway config concurrency handling
  • Better navigation responsiveness and less panel reload churn
  • Stronger E2E runtime isolation for CI and local test harnesses

Detailed Functional Additions

  • Framework adapters and normalized multi-agent registration flow
  • Self-update banner and admin-triggered update flow
  • Tenant-scoped workspaces and free-tier extraction cleanup
  • Google Workspace integration
  • Plugin capabilities system and Hyperbrowser integration
  • Claude Code task bridge
  • OpenClaw backup creation and restore-oriented backup directory handling
  • Embedded /chat panel and provider-session-first chat workspace
  • Memory graph upgrades from Canvas to Reagraph WebGL
  • Security audit panel, agent eval framework, and optimization endpoint
  • OpenClaw update-now trigger from the UI
  • Approvals overlay, channels parity, chat parity, usage parity, device parity, and logs parity with the newer OpenClaw surface

Detailed Fix Areas

  • Login autofill, redirect race, CSP/theme flash, and auth/session regressions
  • Channels auth and RPC fallback behavior
  • Gateway websocket stability and device identity handshake behavior
  • Memory graph blank states, overflow, sizing, auto-fit, and speed issues
  • Agent detail/model-shape crashes and delete/provisioning edge cases
  • Doctor warning misclassification and state-integrity surfacing
  • Security scan autofix false positives and active-host preservation
  • Standalone deploy asset/runtime drift and SQLite migration contention
  • README and docs freshness so product marketing reflects the shipped interface

Upgrade Notes

  • Mission Control 2.0.0 expects Node 22.x.
  • Self-hosted installs should verify env files, host allowlist configuration, and runtime data directory settings after upgrade.
  • If you run OpenClaw, use the in-app doctor and security panels after upgrade to catch any stale config drift.

Links

  • Changelog: CHANGELOG.md
  • README: README.md
  • Security hardening guide: docs/SECURITY-HARDENING.md

Don't miss a new mission-control release

NewReleases is sending notifications on new releases.