docs: refresh README screenshots (#278)

* docs: refresh README screenshots

* docs: prepare v2 release notes
This commit is contained in:
nyk 2026-03-11 19:52:34 +07:00 committed by GitHub
parent e642e55807
commit f5551a2c93
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
7 changed files with 200 additions and 5 deletions

View File

@ -2,6 +2,39 @@
All notable changes to Mission Control are documented in this file. All notable changes to Mission Control are documented in this file.
## [2.0.0] - 2026-03-11
### Added
- Dual-mode operations for both OpenClaw gateway deployments and local workstation installs
- Hermes observability, including session, task, cron, memory, and transcript visibility
- Obsidian-style memory knowledge system with graph visualization, health signals, and filesystem browser
- Rebuilt onboarding flow with session-scoped walkthroughs, security scan, and OpenClaw gateway setup guidance
- OpenClaw doctor status and in-app doctor fix workflow for runtime drift detection and remediation
- Expanded OpenClaw dashboard coverage for channels, chat, sessions, cron, usage, devices, approvals, logs, and schema-backed config
- Global exec approval overlay, unified cost tracker, and richer agent communication/session routing views
- Embedded chat workspace, Claude Code task bridge, framework adapters, self-update flow, and stronger local agent/skill discovery
- Automated task dispatch, automated Aegis review, natural-language recurring tasks, and richer gateway backup/update actions
### Fixed
- Agent and workspace deletion now removes OpenClaw config state correctly and refreshes the UI consistently
- Security scan autofix no longer breaks host access or E2E runtime env state after applying fixes
- Mission Control builds now isolate build-time SQLite state from runtime SQLite state, eliminating `SQLITE_BUSY` build contention
- Standalone deploy/runtime handling now preserves data directories, static assets, and restart detection more reliably
- OpenClaw config compatibility issues around malformed `model.primary` payloads, stale keys, and doctor warning classification
- Local Hermes transcript loading, gateway chat/channel RPC fallbacks, and memory panel regressions from the refactor cycle
- E2E harness isolation so tests use fresh temp OpenClaw state, temp skill roots, and deterministic scheduler behavior
- Login/autofill/CSP regressions, websocket/device-identity edge cases, memory graph fit/overflow issues, and several panel parity gaps found during the refactor
### Changed
- Project version advanced to `2.0.0`
- Node runtime policy standardized on `22.x` across local development, CI, Docker, and standalone deployment
- README, landing-page handoff, and release documentation refreshed to match the current Mission Control interface and feature set
- This release captures 189 commits on top of `main` and marks the major refactor branch as the new baseline for Mission Control
- Navigation, loading, branding, and onboarding flows were redesigned to match the broader v2 operator experience
### Contributors
- @0xNyk
## [1.3.0] - 2026-03-02 ## [1.3.0] - 2026-03-02
### Added ### Added

View File

@ -12,7 +12,7 @@ Manage agent fleets, track tasks, monitor costs, and orchestrate workflows — a
[![TypeScript](https://img.shields.io/badge/TypeScript-5.7-3178C6?logo=typescript&logoColor=white)](https://typescriptlang.org/) [![TypeScript](https://img.shields.io/badge/TypeScript-5.7-3178C6?logo=typescript&logoColor=white)](https://typescriptlang.org/)
[![SQLite](https://img.shields.io/badge/SQLite-WAL-003B57?logo=sqlite&logoColor=white)](https://sqlite.org/) [![SQLite](https://img.shields.io/badge/SQLite-WAL-003B57?logo=sqlite&logoColor=white)](https://sqlite.org/)
![Mission Control Dashboard](docs/mission-control.jpg) ![Mission Control Dashboard](docs/mission-control-overview.png)
</div> </div>
@ -144,6 +144,8 @@ bash scripts/security-audit.sh
### Agent Management ### Agent Management
Monitor agent status, configure models, view heartbeats, and manage the full agent lifecycle from registration to retirement. Agent detail modal with compact overview, inline model selector, and editable sub-agent configuration. Monitor agent status, configure models, view heartbeats, and manage the full agent lifecycle from registration to retirement. Agent detail modal with compact overview, inline model selector, and editable sub-agent configuration.
![Mission Control Agents Panel](docs/mission-control-agents.png)
### Task Board ### Task Board
Kanban board with six columns (inbox → assigned → in progress → review → quality review → done), drag-and-drop, priority levels, assignments, threaded comments, and inline sub-agent spawning. Kanban board with six columns (inbox → assigned → in progress → review → quality review → done), drag-and-drop, priority levels, assignments, threaded comments, and inline sub-agent spawning.
@ -183,6 +185,11 @@ Define agent personality, capabilities, and behavioral guidelines via SOUL markd
### Agent Messaging ### Agent Messaging
Session-threaded inter-agent communication via the comms API (`a2a:*`, `coord:*`, `session:*`) with coordinator inbox support and runtime tool-call visibility in the `agent-comms` feed. Session-threaded inter-agent communication via the comms API (`a2a:*`, `coord:*`, `session:*`) with coordinator inbox support and runtime tool-call visibility in the `agent-comms` feed.
### Memory Knowledge Graph
Explore agent knowledge through the Memory Browser, filesystem-backed memory tree, and interactive relationship graph for sessions, memory chunks, and linked knowledge files.
![Mission Control Memory Graph](docs/mission-control-memory-graph.png)
### Onboarding Wizard ### Onboarding Wizard
Guided first-run setup wizard that walks new users through five steps: Welcome (system capabilities detection), Credentials (verify AUTH_PASS and API_KEY strength), Agent Setup (gateway connection or local Claude Code discovery), Security Scan (automated configuration audit with pass/fail checks), and Get Started (quick links to key panels). Automatically appears on first login and can be re-launched from Settings. Progress is persisted per-user so you can resume where you left off. Guided first-run setup wizard that walks new users through five steps: Welcome (system capabilities detection), Credentials (verify AUTH_PASS and API_KEY strength), Agent Setup (gateway connection or local Claude Code discovery), Security Scan (automated configuration audit with pass/fail checks), and Get Started (quick links to key panels). Automatically appears on first login and can be re-launched from Settings. Progress is persisted per-user so you can resume where you left off.
@ -629,7 +636,7 @@ Trend alerts in the `trends.alerts` response are derived from current-vs-previou
## Roadmap ## Roadmap
See [open issues](https://github.com/builderz-labs/mission-control/issues) for planned work and the [v1.0.0 release notes](https://github.com/builderz-labs/mission-control/releases/tag/v1.0.0) for what shipped. See [open issues](https://github.com/builderz-labs/mission-control/issues) for planned work and the [v2.0.0 release notes](docs/releases/2.0.0.md) for the latest major release summary.
**Completed:** **Completed:**
@ -676,7 +683,7 @@ See [open issues](https://github.com/builderz-labs/mission-control/issues) for p
- [ ] OAuth approval UI improvements - [ ] OAuth approval UI improvements
- [ ] API token rotation UI - [ ] API token rotation UI
[## Contributing ## Contributing
Contributions are welcome. See [CONTRIBUTING.md](CONTRIBUTING.md) for setup instructions and guidelines. Contributions are welcome. See [CONTRIBUTING.md](CONTRIBUTING.md) for setup instructions and guidelines.
@ -694,6 +701,12 @@ If you find this project useful, consider supporting my open-source work.
`BYLu8XD8hGDUtdRBWpGWu5HKoiPrWqCxYFSh4oxXuvPg` `BYLu8XD8hGDUtdRBWpGWu5HKoiPrWqCxYFSh4oxXuvPg`
<p align="center">
<a href="https://star-history.com/#builderz-labs/mission-control&Date">
<img src="https://api.star-history.com/svg?repos=builderz-labs/mission-control&type=Date" alt="Star History" width="400">
</a>
</p>
## License ## License
[MIT](LICENSE) © 2026 [Builderz Labs](https://github.com/builderz-labs)](https://github.com/builderz-labs/mission-control) [MIT](LICENSE) © 2026 [Builderz Labs](https://github.com/builderz-labs/mission-control)

View File

@ -25,7 +25,7 @@ Manage agent fleets, track tasks, monitor costs, and orchestrate workflows — a
- 165 unit tests (Vitest) - 165 unit tests (Vitest)
- 295 E2E tests (Playwright) - 295 E2E tests (Playwright)
**Hero image:** `docs/mission-control.jpg` (current dashboard screenshot — should be refreshed with latest UI) **Hero image:** `docs/mission-control-overview.png` (latest overview dashboard screenshot)
--- ---

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.6 MiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.9 MiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.7 MiB

149
docs/releases/2.0.0.md Normal file
View File

@ -0,0 +1,149 @@
# Mission Control 2.0.0
Released: 2026-03-11
Mission Control 2.0.0 is the major release that lands the `feat/refactor` branch as the new baseline for the project. It rolls up 189 commits on top of `main` and shifts Mission Control from an early dashboard into a broader agent operations console for both local and gateway-driven setups.
## Highlights
### Dual-mode operation
- Mission Control now supports both OpenClaw gateway mode and local workstation mode cleanly.
- Onboarding, runtime detection, security checks, and panel behavior were reworked so the app can adapt to the active environment instead of assuming one deployment shape.
### Broader agent observability
- Hermes observability was added across sessions, memory, tasks, cron, and transcripts.
- OpenClaw coverage was expanded across channels, chat, sessions, cron, devices, approvals, logs, usage, and config editing.
- Agent communication, session routing, and inline transcript visibility were strengthened throughout the app.
### Memory system redesign
- The memory panel was redesigned into an Obsidian-style knowledge surface.
- Mission Control now ships with a filesystem memory browser, link/context endpoints, memory health signals, and an interactive graph view for linked knowledge.
- Loading and navigation performance in the memory panel were improved substantially, including lazy tree loading and graph prefetching.
### Onboarding, security, and doctor workflows
- The onboarding experience was rebuilt into a guided walkthrough with stronger separation between per-user progress and per-session display behavior.
- The security scan now has clearer severity handling, improved autofix behavior, and better reporting of manual vs auto-fixable issues.
- OpenClaw doctor warnings, doctor fix, and state-integrity handling are now surfaced directly in the UI.
### Deployment and runtime hardening
- Node support was standardized on `22.x` across local development, CI, Docker, and standalone deploys.
- Build-time SQLite handling was isolated from runtime SQLite state to avoid noisy or fragile deploy behavior.
- Standalone deploys were hardened around asset inclusion, runtime data directories, backups, and restart detection.
- Dynamic host handling and safer env mutation behavior improved self-hosted reliability.
### Agent lifecycle and operator UX
- Agent/workspace creation and deletion flows were hardened end to end, including OpenClaw config normalization and cleanup.
- The boot loader was redesigned with real progress phases and framework logos.
- Cost tracking, approvals, channels, chat, and session controls were all tightened during the refactor.
## Everything Included In The v2 Update
### Core platform and mode handling
- Local mode and OpenClaw gateway mode were hardened into first-class operating modes.
- Gateway discovery and connection handling improved across configured runtimes, systemd-managed gateways, Tailscale Serve, proxied websocket paths, forwarded-proto setups, and token-preserving websocket URLs.
- Mission Control can register itself as the dashboard for an OpenClaw runtime without the earlier device-auth and dashboard URL failure cases.
- Managed-gateway UX was tightened across health, status, mode badges, and startup auto-connect behavior.
### Agents, sessions, chat, and comms
- Embedded chat became a shared workspace rather than a fragmented set of views.
- Session navigation was unified into Chat, with local Claude/Codex sessions included alongside gateway sessions.
- Hermes sessions, transcripts, memory, tasks, and cron surfaced throughout the app.
- Session transcript handling improved across local, Hermes, aggregated gateway, and disk-backed OpenClaw transcript sources.
- Agent comms, runtime tool visibility, coordinator inbox behavior, session-thread routing, and agent feed ergonomics were hardened.
- Agent registration, self-registration, rate limiting, attribution, wake/spawn actions, and agent detail editing all received follow-up fixes.
### Tasks, quality flow, and automation
- Task dispatch now polls assigned tasks and runs agents through OpenClaw with session linkage.
- Aegis quality review became an automated scheduled workflow for review-stage tasks.
- Natural-language recurring tasks now parse into cron-backed template spawning.
- Spawn/task flows were consolidated, old spawn-only UI was removed, and task/session linking became more traceable.
- Cost tracking moved into a unified Cost Tracker panel.
### Memory, knowledge, and browsing
- The memory experience was redesigned into a graph-first, Obsidian-style knowledge system.
- The memory browser now supports faster loading, lazy directory hydration, better overflow handling, and improved graph fitting behavior.
- Memory APIs expanded around graph, health, links, context, and processing actions.
- Boot-time prefetching and panel persistence reduced the need to re-fetch heavy memory state on every navigation.
### Skills and local discovery
- Skills Hub support expanded across browsing, installation, bidirectional sync, registry search, security scanning, and local disk roots.
- Local agent discovery now covers `~/.agents`, `~/.codex/agents`, and Claude agent roots more reliably.
- Skill roots and E2E skill paths can now be overridden cleanly for isolated test and self-hosted environments.
### Security, audit, and approvals
- Security audit posture scoring, secret detection, evals, optimization, and security events were substantially expanded.
- Security scan severity scoring, infrastructure checks, OpenClaw hardening checks, autofix behavior, and agent-side scan APIs improved.
- Global exec approval overlay and approval flows were added/refined.
- Auth hardening covered timing-safe behavior, CSRF, session revocation, host allowlists, and safer trusted-host resolution.
- Audit trail coverage expanded across grouped action types and more complete operator activity logging.
### Onboarding and first-run experience
- The onboarding wizard went through several iterations and now combines runtime capability detection, gateway setup, security scan, credentials, and guided getting-started flow.
- Walkthrough visibility is session-aware while progress persists per user.
- The loading experience was redesigned with branded motion, framework logos, and real boot phases instead of generic spinner states.
### UI, navigation, and operator polish
- Agent cards, the agent detail modal, the cron calendar, activity/history views, interface mode toggles, sidebar categories, and panel loading states were redesigned.
- Shared loader patterns replaced ad-hoc spinners across more panels.
- Navigation state, URL synchronization, and panel persistence were tightened to reduce remount churn and stale data flashes.
- Branding assets and logos for Mission Control, OpenClaw, Claude, Codex, and Hermes were refreshed across the interface.
### Runtime, deployment, and template hardening
- Standalone deploys were hardened across static assets, runtime data directories, sqlite migration/backup flow, restart detection, and build/runtime separation.
- Build-time DB/token isolation removed noisy runtime coupling during `next build`.
- Node support was standardized on `22.x`, with matching local, CI, Docker, and deploy expectations.
- Proxy and host validation logic became more template-safe and more dynamic for self-hosted environments.
- OpenClaw doctor drift handling, doctor fix, config normalization, and workspace lifecycle cleanup were tightened to better support real self-hosted installs.
### E2E, CI, and release readiness
- The E2E harness now uses isolated OpenClaw runtime state, isolated skill roots, deterministic scheduler behavior, and safer env handling.
- Several regressions that only showed up in CI were fixed around security autofix, workload signals, and agent deletion behavior.
- README, landing page assets, and release documentation were refreshed for the v2 release.
## Notable Improvements
- Unified cost tracker replacing the split token/cost views
- Global exec approval overlay
- Better local agent discovery and skill sync behavior
- More reliable gateway config concurrency handling
- Better navigation responsiveness and less panel reload churn
- Stronger E2E runtime isolation for CI and local test harnesses
## Detailed Functional Additions
- Framework adapters and normalized multi-agent registration flow
- Self-update banner and admin-triggered update flow
- Tenant-scoped workspaces and free-tier extraction cleanup
- Google Workspace integration
- Plugin capabilities system and Hyperbrowser integration
- Claude Code task bridge
- OpenClaw backup creation and restore-oriented backup directory handling
- Embedded `/chat` panel and provider-session-first chat workspace
- Memory graph upgrades from Canvas to Reagraph WebGL
- Security audit panel, agent eval framework, and optimization endpoint
- OpenClaw update-now trigger from the UI
- Approvals overlay, channels parity, chat parity, usage parity, device parity, and logs parity with the newer OpenClaw surface
## Detailed Fix Areas
- Login autofill, redirect race, CSP/theme flash, and auth/session regressions
- Channels auth and RPC fallback behavior
- Gateway websocket stability and device identity handshake behavior
- Memory graph blank states, overflow, sizing, auto-fit, and speed issues
- Agent detail/model-shape crashes and delete/provisioning edge cases
- Doctor warning misclassification and state-integrity surfacing
- Security scan autofix false positives and active-host preservation
- Standalone deploy asset/runtime drift and SQLite migration contention
- README and docs freshness so product marketing reflects the shipped interface
## Upgrade Notes
- Mission Control 2.0.0 expects Node `22.x`.
- Self-hosted installs should verify env files, host allowlist configuration, and runtime data directory settings after upgrade.
- If you run OpenClaw, use the in-app doctor and security panels after upgrade to catch any stale config drift.
## Links
- Changelog: [`CHANGELOG.md`](../../CHANGELOG.md)
- README: [`README.md`](../../README.md)
- Security hardening guide: [`docs/SECURITY-HARDENING.md`](../SECURITY-HARDENING.md)