|
| 1 | +# Mission Control 2.0.0 |
| 2 | + |
| 3 | +Released: 2026-03-11 |
| 4 | + |
| 5 | +Mission Control 2.0.0 is the major release that lands the `feat/refactor` branch as the new baseline for the project. It rolls up 189 commits on top of `main` and shifts Mission Control from an early dashboard into a broader agent operations console for both local and gateway-driven setups. |
| 6 | + |
| 7 | +## Highlights |
| 8 | + |
| 9 | +### Dual-mode operation |
| 10 | +- Mission Control now supports both OpenClaw gateway mode and local workstation mode cleanly. |
| 11 | +- Onboarding, runtime detection, security checks, and panel behavior were reworked so the app can adapt to the active environment instead of assuming one deployment shape. |
| 12 | + |
| 13 | +### Broader agent observability |
| 14 | +- Hermes observability was added across sessions, memory, tasks, cron, and transcripts. |
| 15 | +- OpenClaw coverage was expanded across channels, chat, sessions, cron, devices, approvals, logs, usage, and config editing. |
| 16 | +- Agent communication, session routing, and inline transcript visibility were strengthened throughout the app. |
| 17 | + |
| 18 | +### Memory system redesign |
| 19 | +- The memory panel was redesigned into an Obsidian-style knowledge surface. |
| 20 | +- Mission Control now ships with a filesystem memory browser, link/context endpoints, memory health signals, and an interactive graph view for linked knowledge. |
| 21 | +- Loading and navigation performance in the memory panel were improved substantially, including lazy tree loading and graph prefetching. |
| 22 | + |
| 23 | +### Onboarding, security, and doctor workflows |
| 24 | +- The onboarding experience was rebuilt into a guided walkthrough with stronger separation between per-user progress and per-session display behavior. |
| 25 | +- The security scan now has clearer severity handling, improved autofix behavior, and better reporting of manual vs auto-fixable issues. |
| 26 | +- OpenClaw doctor warnings, doctor fix, and state-integrity handling are now surfaced directly in the UI. |
| 27 | + |
| 28 | +### Deployment and runtime hardening |
| 29 | +- Node support was standardized on `22.x` across local development, CI, Docker, and standalone deploys. |
| 30 | +- Build-time SQLite handling was isolated from runtime SQLite state to avoid noisy or fragile deploy behavior. |
| 31 | +- Standalone deploys were hardened around asset inclusion, runtime data directories, backups, and restart detection. |
| 32 | +- Dynamic host handling and safer env mutation behavior improved self-hosted reliability. |
| 33 | + |
| 34 | +### Agent lifecycle and operator UX |
| 35 | +- Agent/workspace creation and deletion flows were hardened end to end, including OpenClaw config normalization and cleanup. |
| 36 | +- The boot loader was redesigned with real progress phases and framework logos. |
| 37 | +- Cost tracking, approvals, channels, chat, and session controls were all tightened during the refactor. |
| 38 | + |
| 39 | +## Everything Included In The v2 Update |
| 40 | + |
| 41 | +### Core platform and mode handling |
| 42 | +- Local mode and OpenClaw gateway mode were hardened into first-class operating modes. |
| 43 | +- Gateway discovery and connection handling improved across configured runtimes, systemd-managed gateways, Tailscale Serve, proxied websocket paths, forwarded-proto setups, and token-preserving websocket URLs. |
| 44 | +- Mission Control can register itself as the dashboard for an OpenClaw runtime without the earlier device-auth and dashboard URL failure cases. |
| 45 | +- Managed-gateway UX was tightened across health, status, mode badges, and startup auto-connect behavior. |
| 46 | + |
| 47 | +### Agents, sessions, chat, and comms |
| 48 | +- Embedded chat became a shared workspace rather than a fragmented set of views. |
| 49 | +- Session navigation was unified into Chat, with local Claude/Codex sessions included alongside gateway sessions. |
| 50 | +- Hermes sessions, transcripts, memory, tasks, and cron surfaced throughout the app. |
| 51 | +- Session transcript handling improved across local, Hermes, aggregated gateway, and disk-backed OpenClaw transcript sources. |
| 52 | +- Agent comms, runtime tool visibility, coordinator inbox behavior, session-thread routing, and agent feed ergonomics were hardened. |
| 53 | +- Agent registration, self-registration, rate limiting, attribution, wake/spawn actions, and agent detail editing all received follow-up fixes. |
| 54 | + |
| 55 | +### Tasks, quality flow, and automation |
| 56 | +- Task dispatch now polls assigned tasks and runs agents through OpenClaw with session linkage. |
| 57 | +- Aegis quality review became an automated scheduled workflow for review-stage tasks. |
| 58 | +- Natural-language recurring tasks now parse into cron-backed template spawning. |
| 59 | +- Spawn/task flows were consolidated, old spawn-only UI was removed, and task/session linking became more traceable. |
| 60 | +- Cost tracking moved into a unified Cost Tracker panel. |
| 61 | + |
| 62 | +### Memory, knowledge, and browsing |
| 63 | +- The memory experience was redesigned into a graph-first, Obsidian-style knowledge system. |
| 64 | +- The memory browser now supports faster loading, lazy directory hydration, better overflow handling, and improved graph fitting behavior. |
| 65 | +- Memory APIs expanded around graph, health, links, context, and processing actions. |
| 66 | +- Boot-time prefetching and panel persistence reduced the need to re-fetch heavy memory state on every navigation. |
| 67 | + |
| 68 | +### Skills and local discovery |
| 69 | +- Skills Hub support expanded across browsing, installation, bidirectional sync, registry search, security scanning, and local disk roots. |
| 70 | +- Local agent discovery now covers `~/.agents`, `~/.codex/agents`, and Claude agent roots more reliably. |
| 71 | +- Skill roots and E2E skill paths can now be overridden cleanly for isolated test and self-hosted environments. |
| 72 | + |
| 73 | +### Security, audit, and approvals |
| 74 | +- Security audit posture scoring, secret detection, evals, optimization, and security events were substantially expanded. |
| 75 | +- Security scan severity scoring, infrastructure checks, OpenClaw hardening checks, autofix behavior, and agent-side scan APIs improved. |
| 76 | +- Global exec approval overlay and approval flows were added/refined. |
| 77 | +- Auth hardening covered timing-safe behavior, CSRF, session revocation, host allowlists, and safer trusted-host resolution. |
| 78 | +- Audit trail coverage expanded across grouped action types and more complete operator activity logging. |
| 79 | + |
| 80 | +### Onboarding and first-run experience |
| 81 | +- The onboarding wizard went through several iterations and now combines runtime capability detection, gateway setup, security scan, credentials, and guided getting-started flow. |
| 82 | +- Walkthrough visibility is session-aware while progress persists per user. |
| 83 | +- The loading experience was redesigned with branded motion, framework logos, and real boot phases instead of generic spinner states. |
| 84 | + |
| 85 | +### UI, navigation, and operator polish |
| 86 | +- Agent cards, the agent detail modal, the cron calendar, activity/history views, interface mode toggles, sidebar categories, and panel loading states were redesigned. |
| 87 | +- Shared loader patterns replaced ad-hoc spinners across more panels. |
| 88 | +- Navigation state, URL synchronization, and panel persistence were tightened to reduce remount churn and stale data flashes. |
| 89 | +- Branding assets and logos for Mission Control, OpenClaw, Claude, Codex, and Hermes were refreshed across the interface. |
| 90 | + |
| 91 | +### Runtime, deployment, and template hardening |
| 92 | +- Standalone deploys were hardened across static assets, runtime data directories, sqlite migration/backup flow, restart detection, and build/runtime separation. |
| 93 | +- Build-time DB/token isolation removed noisy runtime coupling during `next build`. |
| 94 | +- Node support was standardized on `22.x`, with matching local, CI, Docker, and deploy expectations. |
| 95 | +- Proxy and host validation logic became more template-safe and more dynamic for self-hosted environments. |
| 96 | +- OpenClaw doctor drift handling, doctor fix, config normalization, and workspace lifecycle cleanup were tightened to better support real self-hosted installs. |
| 97 | + |
| 98 | +### E2E, CI, and release readiness |
| 99 | +- The E2E harness now uses isolated OpenClaw runtime state, isolated skill roots, deterministic scheduler behavior, and safer env handling. |
| 100 | +- Several regressions that only showed up in CI were fixed around security autofix, workload signals, and agent deletion behavior. |
| 101 | +- README, landing page assets, and release documentation were refreshed for the v2 release. |
| 102 | + |
| 103 | +## Notable Improvements |
| 104 | + |
| 105 | +- Unified cost tracker replacing the split token/cost views |
| 106 | +- Global exec approval overlay |
| 107 | +- Better local agent discovery and skill sync behavior |
| 108 | +- More reliable gateway config concurrency handling |
| 109 | +- Better navigation responsiveness and less panel reload churn |
| 110 | +- Stronger E2E runtime isolation for CI and local test harnesses |
| 111 | + |
| 112 | +## Detailed Functional Additions |
| 113 | + |
| 114 | +- Framework adapters and normalized multi-agent registration flow |
| 115 | +- Self-update banner and admin-triggered update flow |
| 116 | +- Tenant-scoped workspaces and free-tier extraction cleanup |
| 117 | +- Google Workspace integration |
| 118 | +- Plugin capabilities system and Hyperbrowser integration |
| 119 | +- Claude Code task bridge |
| 120 | +- OpenClaw backup creation and restore-oriented backup directory handling |
| 121 | +- Embedded `/chat` panel and provider-session-first chat workspace |
| 122 | +- Memory graph upgrades from Canvas to Reagraph WebGL |
| 123 | +- Security audit panel, agent eval framework, and optimization endpoint |
| 124 | +- OpenClaw update-now trigger from the UI |
| 125 | +- Approvals overlay, channels parity, chat parity, usage parity, device parity, and logs parity with the newer OpenClaw surface |
| 126 | + |
| 127 | +## Detailed Fix Areas |
| 128 | + |
| 129 | +- Login autofill, redirect race, CSP/theme flash, and auth/session regressions |
| 130 | +- Channels auth and RPC fallback behavior |
| 131 | +- Gateway websocket stability and device identity handshake behavior |
| 132 | +- Memory graph blank states, overflow, sizing, auto-fit, and speed issues |
| 133 | +- Agent detail/model-shape crashes and delete/provisioning edge cases |
| 134 | +- Doctor warning misclassification and state-integrity surfacing |
| 135 | +- Security scan autofix false positives and active-host preservation |
| 136 | +- Standalone deploy asset/runtime drift and SQLite migration contention |
| 137 | +- README and docs freshness so product marketing reflects the shipped interface |
| 138 | + |
| 139 | +## Upgrade Notes |
| 140 | + |
| 141 | +- Mission Control 2.0.0 expects Node `22.x`. |
| 142 | +- Self-hosted installs should verify env files, host allowlist configuration, and runtime data directory settings after upgrade. |
| 143 | +- If you run OpenClaw, use the in-app doctor and security panels after upgrade to catch any stale config drift. |
| 144 | + |
| 145 | +## Links |
| 146 | + |
| 147 | +- Changelog: [`CHANGELOG.md`](../../CHANGELOG.md) |
| 148 | +- README: [`README.md`](../../README.md) |
| 149 | +- Security hardening guide: [`docs/SECURITY-HARDENING.md`](../SECURITY-HARDENING.md) |
0 commit comments