# Mission Control 2.0.0 Released: 2026-03-11 Mission Control 2.0.0 is the major release that lands the `feat/refactor` branch as the new baseline for the project. It rolls up 189 commits on top of `main` and shifts Mission Control from an early dashboard into a broader agent operations console for both local and gateway-driven setups. ## Highlights ### Dual-mode operation - Mission Control now supports both OpenClaw gateway mode and local workstation mode cleanly. - Onboarding, runtime detection, security checks, and panel behavior were reworked so the app can adapt to the active environment instead of assuming one deployment shape. ### Broader agent observability - Hermes observability was added across sessions, memory, tasks, cron, and transcripts. - OpenClaw coverage was expanded across channels, chat, sessions, cron, devices, approvals, logs, usage, and config editing. - Agent communication, session routing, and inline transcript visibility were strengthened throughout the app. ### Memory system redesign - The memory panel was redesigned into an Obsidian-style knowledge surface. - Mission Control now ships with a filesystem memory browser, link/context endpoints, memory health signals, and an interactive graph view for linked knowledge. - Loading and navigation performance in the memory panel were improved substantially, including lazy tree loading and graph prefetching. ### Onboarding, security, and doctor workflows - The onboarding experience was rebuilt into a guided walkthrough with stronger separation between per-user progress and per-session display behavior. - The security scan now has clearer severity handling, improved autofix behavior, and better reporting of manual vs auto-fixable issues. - OpenClaw doctor warnings, doctor fix, and state-integrity handling are now surfaced directly in the UI. ### Deployment and runtime hardening - Node support was standardized on `22.x` across local development, CI, Docker, and standalone deploys. - Build-time SQLite handling was isolated from runtime SQLite state to avoid noisy or fragile deploy behavior. - Standalone deploys were hardened around asset inclusion, runtime data directories, backups, and restart detection. - Dynamic host handling and safer env mutation behavior improved self-hosted reliability. ### Agent lifecycle and operator UX - Agent/workspace creation and deletion flows were hardened end to end, including OpenClaw config normalization and cleanup. - The boot loader was redesigned with real progress phases and framework logos. - Cost tracking, approvals, channels, chat, and session controls were all tightened during the refactor. ## Everything Included In The v2 Update ### Core platform and mode handling - Local mode and OpenClaw gateway mode were hardened into first-class operating modes. - Gateway discovery and connection handling improved across configured runtimes, systemd-managed gateways, Tailscale Serve, proxied websocket paths, forwarded-proto setups, and token-preserving websocket URLs. - Mission Control can register itself as the dashboard for an OpenClaw runtime without the earlier device-auth and dashboard URL failure cases. - Managed-gateway UX was tightened across health, status, mode badges, and startup auto-connect behavior. ### Agents, sessions, chat, and comms - Embedded chat became a shared workspace rather than a fragmented set of views. - Session navigation was unified into Chat, with local Claude/Codex sessions included alongside gateway sessions. - Hermes sessions, transcripts, memory, tasks, and cron surfaced throughout the app. - Session transcript handling improved across local, Hermes, aggregated gateway, and disk-backed OpenClaw transcript sources. - Agent comms, runtime tool visibility, coordinator inbox behavior, session-thread routing, and agent feed ergonomics were hardened. - Agent registration, self-registration, rate limiting, attribution, wake/spawn actions, and agent detail editing all received follow-up fixes. ### Tasks, quality flow, and automation - Task dispatch now polls assigned tasks and runs agents through OpenClaw with session linkage. - Aegis quality review became an automated scheduled workflow for review-stage tasks. - Natural-language recurring tasks now parse into cron-backed template spawning. - Spawn/task flows were consolidated, old spawn-only UI was removed, and task/session linking became more traceable. - Cost tracking moved into a unified Cost Tracker panel. ### Memory, knowledge, and browsing - The memory experience was redesigned into a graph-first, Obsidian-style knowledge system. - The memory browser now supports faster loading, lazy directory hydration, better overflow handling, and improved graph fitting behavior. - Memory APIs expanded around graph, health, links, context, and processing actions. - Boot-time prefetching and panel persistence reduced the need to re-fetch heavy memory state on every navigation. ### Skills and local discovery - Skills Hub support expanded across browsing, installation, bidirectional sync, registry search, security scanning, and local disk roots. - Local agent discovery now covers `~/.agents`, `~/.codex/agents`, and Claude agent roots more reliably. - Skill roots and E2E skill paths can now be overridden cleanly for isolated test and self-hosted environments. ### Security, audit, and approvals - Security audit posture scoring, secret detection, evals, optimization, and security events were substantially expanded. - Security scan severity scoring, infrastructure checks, OpenClaw hardening checks, autofix behavior, and agent-side scan APIs improved. - Global exec approval overlay and approval flows were added/refined. - Auth hardening covered timing-safe behavior, CSRF, session revocation, host allowlists, and safer trusted-host resolution. - Audit trail coverage expanded across grouped action types and more complete operator activity logging. ### Onboarding and first-run experience - The onboarding wizard went through several iterations and now combines runtime capability detection, gateway setup, security scan, credentials, and guided getting-started flow. - Walkthrough visibility is session-aware while progress persists per user. - The loading experience was redesigned with branded motion, framework logos, and real boot phases instead of generic spinner states. ### UI, navigation, and operator polish - Agent cards, the agent detail modal, the cron calendar, activity/history views, interface mode toggles, sidebar categories, and panel loading states were redesigned. - Shared loader patterns replaced ad-hoc spinners across more panels. - Navigation state, URL synchronization, and panel persistence were tightened to reduce remount churn and stale data flashes. - Branding assets and logos for Mission Control, OpenClaw, Claude, Codex, and Hermes were refreshed across the interface. ### Runtime, deployment, and template hardening - Standalone deploys were hardened across static assets, runtime data directories, sqlite migration/backup flow, restart detection, and build/runtime separation. - Build-time DB/token isolation removed noisy runtime coupling during `next build`. - Node support was standardized on `22.x`, with matching local, CI, Docker, and deploy expectations. - Proxy and host validation logic became more template-safe and more dynamic for self-hosted environments. - OpenClaw doctor drift handling, doctor fix, config normalization, and workspace lifecycle cleanup were tightened to better support real self-hosted installs. ### E2E, CI, and release readiness - The E2E harness now uses isolated OpenClaw runtime state, isolated skill roots, deterministic scheduler behavior, and safer env handling. - Several regressions that only showed up in CI were fixed around security autofix, workload signals, and agent deletion behavior. - README, landing page assets, and release documentation were refreshed for the v2 release. ## Notable Improvements - Unified cost tracker replacing the split token/cost views - Global exec approval overlay - Better local agent discovery and skill sync behavior - More reliable gateway config concurrency handling - Better navigation responsiveness and less panel reload churn - Stronger E2E runtime isolation for CI and local test harnesses ## Detailed Functional Additions - Framework adapters and normalized multi-agent registration flow - Self-update banner and admin-triggered update flow - Tenant-scoped workspaces and free-tier extraction cleanup - Google Workspace integration - Plugin capabilities system and Hyperbrowser integration - Claude Code task bridge - OpenClaw backup creation and restore-oriented backup directory handling - Embedded `/chat` panel and provider-session-first chat workspace - Memory graph upgrades from Canvas to Reagraph WebGL - Security audit panel, agent eval framework, and optimization endpoint - OpenClaw update-now trigger from the UI - Approvals overlay, channels parity, chat parity, usage parity, device parity, and logs parity with the newer OpenClaw surface ## Detailed Fix Areas - Login autofill, redirect race, CSP/theme flash, and auth/session regressions - Channels auth and RPC fallback behavior - Gateway websocket stability and device identity handshake behavior - Memory graph blank states, overflow, sizing, auto-fit, and speed issues - Agent detail/model-shape crashes and delete/provisioning edge cases - Doctor warning misclassification and state-integrity surfacing - Security scan autofix false positives and active-host preservation - Standalone deploy asset/runtime drift and SQLite migration contention - README and docs freshness so product marketing reflects the shipped interface ## Upgrade Notes - Mission Control 2.0.0 expects Node `22.x`. - Self-hosted installs should verify env files, host allowlist configuration, and runtime data directory settings after upgrade. - If you run OpenClaw, use the in-app doctor and security panels after upgrade to catch any stale config drift. ## Links - Changelog: [`CHANGELOG.md`](../../CHANGELOG.md) - README: [`README.md`](../../README.md) - Security hardening guide: [`docs/SECURITY-HARDENING.md`](../SECURITY-HARDENING.md)