The open-source dashboard for AI agent orchestration.
Manage agent fleets, track tasks, monitor costs, and orchestrate workflows — all from a single pane of glass.
Alpha Software — Mission Control is under active development. APIs, database schemas, and configuration formats may change between releases. Review the known limitations and security considerations before deploying to production.
Running AI agents at scale means juggling sessions, tasks, costs, and reliability across multiple models and channels. Mission Control gives you:
- 28 panels — Tasks, agents, logs, tokens, memory, cron, alerts, webhooks, pipelines, and more
- Real-time everything — WebSocket + SSE push updates, smart polling that pauses when you're away
- Zero external dependencies — SQLite database, single
pnpm startto run, no Redis/Postgres/Docker required - Role-based access — Viewer, operator, and admin roles with session + API key auth
- Quality gates — Built-in review system that blocks task completion without sign-off
- Multi-gateway — Connect to multiple agent gateways simultaneously (OpenClaw, and more coming soon)
Requires pnpm — Mission Control uses pnpm for dependency management. Install it with
npm install -g pnpmorcorepack enable.
git clone https://github.com/builderz-labs/mission-control.git
cd mission-control
pnpm install
cp .env.example .env # edit with your values
pnpm dev # http://localhost:3000Initial login is seeded from AUTH_USER / AUTH_PASS on first run.
- Agent management with full lifecycle (register, heartbeat, wake, retire)
- Kanban task board with drag-and-drop, priorities, assignments, and comments
- Real-time monitoring via WebSocket + SSE with smart polling
- Token usage and cost tracking with per-model breakdowns
- Multi-gateway connection management
- Role-based access control (viewer, operator, admin)
- Background scheduler for automated tasks
- Outbound webhooks with delivery history, retry with exponential backoff, and circuit breaker
- Webhook signature verification (HMAC-SHA256 with constant-time comparison)
- Local Claude Code session tracking (auto-discovers from
~/.claude/projects/) - Quality review gates for task sign-off
- Pipeline orchestration with workflow templates
- Ed25519 device identity for secure gateway handshake
- Agent SOUL system with workspace file sync and templates
- Agent inter-agent messaging and comms
- Update available banner with GitHub release check
- CSP still includes
unsafe-inline—unsafe-evalhas been removed, but inline styles remain for framework compatibility
- Change all default credentials (
AUTH_USER,AUTH_PASS,API_KEY) before deploying - Deploy behind a reverse proxy with TLS (e.g., Caddy, nginx) for any network-accessible deployment
- Review SECURITY.md for the vulnerability reporting process
- Do not expose the dashboard to the public internet without configuring
MC_ALLOWED_HOSTSand TLS
Monitor agent status, spawn new sessions, view heartbeats, and manage the full agent lifecycle from registration to retirement.
Kanban board with six columns (inbox → backlog → todo → in-progress → review → done), drag-and-drop, priority levels, assignments, and threaded comments.
Live activity feed, session inspector, and log viewer with filtering. WebSocket connection to OpenClaw gateway for instant event delivery.
Token usage dashboard with per-model breakdowns, trend charts, and cost analysis powered by Recharts.
Scheduled tasks for database backups, stale record cleanup, and agent heartbeat monitoring. Configurable via UI or API.
Connect Claude Code, Codex, or any CLI tool directly to Mission Control without requiring a gateway. Register connections, send heartbeats with inline token reporting, and auto-register agents.
Automatically discovers and tracks local Claude Code sessions by scanning ~/.claude/projects/. Extracts token usage, model info, message counts, cost estimates, and active status from JSONL transcripts. Scans every 60 seconds via the background scheduler.
Inbound sync from GitHub repositories with label and assignee mapping. Synced issues appear on the task board alongside agent-created tasks.
Define agent personality, capabilities, and behavioral guidelines via SOUL markdown files. Edit in the UI or directly in workspace soul.md files — changes sync bidirectionally between disk and database.
Inter-agent communication via the comms API. Agents can send messages to each other, enabling coordinated multi-agent workflows.
Outbound webhooks with delivery history, configurable alert rules with cooldowns, and multi-gateway connection management. Optional 1Password CLI integration for secret management.
Automatic GitHub release check notifies you when a new version is available, displayed as a banner in the dashboard.
mission-control/
├── src/
│ ├── proxy.ts # Auth gate + CSRF + network access control
│ ├── app/
│ │ ├── page.tsx # SPA shell — routes all panels
│ │ ├── login/page.tsx # Login page
│ │ └── api/ # 66 REST API routes
│ ├── components/
│ │ ├── layout/ # NavRail, HeaderBar, LiveFeed
│ │ ├── dashboard/ # Overview dashboard
│ │ ├── panels/ # 28 feature panels
│ │ └── chat/ # Agent chat UI
│ ├── lib/
│ │ ├── auth.ts # Session + API key auth, RBAC
│ │ ├── db.ts # SQLite (better-sqlite3, WAL mode)
│ │ ├── claude-sessions.ts # Local Claude Code session scanner
│ │ ├── migrations.ts # 21 schema migrations
│ │ ├── scheduler.ts # Background task scheduler
│ │ ├── webhooks.ts # Outbound webhook delivery
│ │ ├── websocket.ts # Gateway WebSocket client
│ │ ├── device-identity.ts # Ed25519 device identity for gateway auth
│ │ └── agent-sync.ts # OpenClaw config → MC database sync
│ └── store/index.ts # Zustand state management
└── .data/ # Runtime data (SQLite DB, token logs)
| Layer | Technology |
|---|---|
| Framework | Next.js 16 (App Router) |
| UI | React 19, Tailwind CSS 3.4 |
| Language | TypeScript 5.7 |
| Database | SQLite via better-sqlite3 (WAL mode) |
| State | Zustand 5 |
| Charts | Recharts 3 |
| Real-time | WebSocket + Server-Sent Events |
| Auth | scrypt hashing, session tokens, RBAC |
| Validation | Zod 4 |
| Testing | Vitest + Playwright (148 E2E tests) |
Three auth methods, three roles:
| Method | Details |
|---|---|
| Session cookie | POST /api/auth/login sets mc-session (7-day expiry) |
| API key | x-api-key header matches API_KEY env var |
| Google Sign-In | OAuth with admin approval workflow |
| Role | Access |
|---|---|
viewer |
Read-only |
operator |
Read + write (tasks, agents, chat) |
admin |
Full access (users, settings, system ops) |
All endpoints require authentication unless noted. Full reference below.
Auth
| Method | Path | Description |
|---|---|---|
POST |
/api/auth/login |
Login with username/password |
POST |
/api/auth/google |
Google Sign-In |
POST |
/api/auth/logout |
Destroy session |
GET |
/api/auth/me |
Current user info |
GET |
/api/auth/access-requests |
List pending access requests (admin) |
POST |
/api/auth/access-requests |
Approve/reject requests (admin) |
Core Resources
| Method | Path | Role | Description |
|---|---|---|---|
GET |
/api/agents |
viewer | List agents with task stats |
POST |
/api/agents |
operator | Register/update agent |
GET |
/api/agents/[id] |
viewer | Agent details |
POST |
/api/agents/sync |
operator | Sync agents from openclaw.json |
GET/PUT |
/api/agents/[id]/soul |
operator | Agent SOUL content (reads from workspace, writes to both) |
GET/POST |
/api/agents/comms |
operator | Agent inter-agent communication |
POST |
/api/agents/message |
operator | Send message to agent |
GET |
/api/tasks |
viewer | List tasks (filter: ?status=, ?assigned_to=, ?priority=) |
POST |
/api/tasks |
operator | Create task |
GET |
/api/tasks/[id] |
viewer | Task details |
PUT |
/api/tasks/[id] |
operator | Update task |
DELETE |
/api/tasks/[id] |
admin | Delete task |
GET |
/api/tasks/[id]/comments |
viewer | Task comments |
POST |
/api/tasks/[id]/comments |
operator | Add comment |
POST |
/api/tasks/[id]/broadcast |
operator | Broadcast task to agents |
Monitoring
| Method | Path | Role | Description |
|---|---|---|---|
GET |
/api/status |
viewer | System status (uptime, memory, disk) |
GET |
/api/activities |
viewer | Activity feed |
GET |
/api/notifications |
viewer | Notifications for recipient |
GET |
/api/sessions |
viewer | Active gateway sessions |
GET |
/api/tokens |
viewer | Token usage and cost data |
GET |
/api/standup |
viewer | Standup report history |
POST |
/api/standup |
operator | Generate standup |
GET |
/api/releases/check |
viewer | Check for new GitHub releases |
Configuration
| Method | Path | Role | Description |
|---|---|---|---|
GET/PUT |
/api/settings |
admin | App settings |
GET/PUT |
/api/gateway-config |
admin | OpenClaw gateway config |
GET/POST |
/api/cron |
admin | Cron management |
Operations
| Method | Path | Role | Description |
|---|---|---|---|
GET/POST |
/api/scheduler |
admin | Background task scheduler |
GET |
/api/audit |
admin | Audit log |
GET |
/api/logs |
viewer | Agent log browser |
GET |
/api/memory |
viewer | Memory file browser/search |
GET |
/api/search |
viewer | Global search |
GET |
/api/export |
admin | CSV export |
POST |
/api/backup |
admin | Database backup |
POST |
/api/cleanup |
admin | Stale data cleanup |
Integrations
| Method | Path | Role | Description |
|---|---|---|---|
GET/POST/PUT/DELETE |
/api/webhooks |
admin | Webhook CRUD |
POST |
/api/webhooks/test |
admin | Test delivery |
POST |
/api/webhooks/retry |
admin | Manual retry a failed delivery |
GET |
/api/webhooks/verify-docs |
viewer | Signature verification docs |
GET |
/api/webhooks/deliveries |
admin | Delivery history |
GET/POST/PUT/DELETE |
/api/alerts |
admin | Alert rules |
GET/POST/PUT/DELETE |
/api/gateways |
admin | Gateway connections |
GET/PUT/DELETE/POST |
/api/integrations |
admin | Integration management |
POST |
/api/github |
admin | Trigger GitHub Issues sync |
Direct CLI
| Method | Path | Role | Description |
|---|---|---|---|
POST |
/api/connect |
operator | Register direct CLI connection |
GET |
/api/connect |
viewer | List active connections |
DELETE |
/api/connect |
operator | Disconnect CLI session |
Chat & Real-time
| Method | Path | Description |
|---|---|---|
GET |
/api/events |
SSE stream of DB changes |
GET/POST |
/api/chat/conversations |
Conversation CRUD |
GET/POST |
/api/chat/messages |
Message CRUD |
Agent Lifecycle
| Method | Path | Role | Description |
|---|---|---|---|
POST |
/api/spawn |
operator | Spawn agent session |
POST |
/api/agents/[id]/heartbeat |
operator | Agent heartbeat |
POST |
/api/agents/[id]/wake |
operator | Wake sleeping agent |
POST |
/api/quality-review |
operator | Submit quality review |
Claude Code Sessions
| Method | Path | Role | Description |
|---|---|---|---|
GET |
/api/claude/sessions |
viewer | List discovered sessions (filter: ?active=1, ?project=) |
POST |
/api/claude/sessions |
operator | Trigger manual session scan |
Pipelines
| Method | Path | Role | Description |
|---|---|---|---|
GET |
/api/pipelines |
viewer | List pipeline runs |
POST |
/api/pipelines/run |
operator | Start pipeline |
GET/POST |
/api/workflows |
viewer/admin | Workflow templates |
See .env.example for the complete list. Key variables:
| Variable | Required | Description |
|---|---|---|
AUTH_USER |
No | Initial admin username (default: admin) |
AUTH_PASS |
No | Initial admin password |
API_KEY |
No | API key for headless access |
OPENCLAW_HOME |
Yes* | Path to .openclaw directory |
OPENCLAW_GATEWAY_HOST |
No | Gateway host (default: 127.0.0.1) |
OPENCLAW_GATEWAY_PORT |
No | Gateway WebSocket port (default: 18789) |
OPENCLAW_GATEWAY_TOKEN |
No | Server-side gateway auth token |
NEXT_PUBLIC_GATEWAY_TOKEN |
No | Browser-side gateway auth token (must use NEXT_PUBLIC_ prefix) |
OPENCLAW_MEMORY_DIR |
No | Memory browser root (see note below) |
MC_CLAUDE_HOME |
No | Path to ~/.claude directory (default: ~/.claude) |
MC_TRUSTED_PROXIES |
No | Comma-separated trusted proxy IPs for XFF parsing |
MC_ALLOWED_HOSTS |
No | Host allowlist for production |
*Memory browser, log viewer, and gateway config require OPENCLAW_HOME.
Memory Browser note: OpenClaw does not store agent memory markdown files under
$OPENCLAW_HOME/memory/— that directory does not exist by default. Agent memory lives in each agent's workspace (e.g.~/clawd-agents/{agent}/memory/). SetOPENCLAW_MEMORY_DIRto your agents root directory to make the Memory Browser show daily logs,MEMORY.md, and other markdown files:OPENCLAW_MEMORY_DIR=/home/you/clawd-agents
# Build
pnpm install --frozen-lockfile
pnpm build
# Run
OPENCLAW_HOME=/path/to/.openclaw pnpm startNetwork access is restricted by default in production. Set MC_ALLOWED_HOSTS (comma-separated) or MC_ALLOW_ANY_HOST=1 to control access.
pnpm dev # Dev server
pnpm build # Production build
pnpm typecheck # TypeScript check
pnpm lint # ESLint
pnpm test # Vitest unit tests
pnpm test:e2e # Playwright E2E
pnpm quality:gate # All checksSee open issues for planned work and the v1.0.0 release notes for what shipped.
Completed:
-
Dockerfile and docker-compose.yml (#34)
-
Implement session control actions — monitor/pause/terminate are stub buttons (#35)
-
Dynamic model catalog — replace hardcoded pricing across 3 files (#36)
-
API-wide rate limiting (#37)
-
React error boundaries around panels (#38)
-
Structured logging with pino (#39)
-
Accessibility improvements — WCAG 2.1 AA (#40)
-
HSTS header for TLS deployments (#41)
-
Input validation with zod schemas (#42)
-
Export endpoint row limits (#43)
-
Fill in Vitest unit test stubs with real assertions
-
Direct CLI integration — connect tools like Codex, Claude Code, or custom CLIs directly without requiring a gateway (#61)
-
OpenAPI 3.1 documentation with Scalar UI (#60)
-
GitHub Issues sync — inbound sync with label/assignee mapping (#63)
-
Webhook retry with exponential backoff and circuit breaker
-
Webhook signature verification (HMAC-SHA256 with constant-time comparison)
-
Local Claude Code session tracking — auto-discover sessions from
~/.claude/projects/ -
Rate limiter IP extraction hardening with trusted proxy support
-
Ed25519 device identity for WebSocket challenge-response handshake (#85)
-
Agent SOUL workspace sync — bidirectional sync between
soul.mdfiles and database (#95) -
Update available banner with GitHub release check (#94)
-
Side panel navigation synced with URL routes (#87)
-
Task board SSE wiring, priority enum, and auto-advance (#89)
Up next:
- Agent-agnostic gateway support — connect any orchestration framework (OpenClaw, ZeroClaw, OpenFang, NeoBot, IronClaw, etc.), not just OpenClaw
- Workspace isolation for multi-team usage (#75)
- Flight Deck — native desktop companion app (Tauri v2) with real PTY terminal grid, stall inbox with native OS notifications, and system tray HUD. Currently in private beta.
- First-class per-agent cost breakdowns — dedicated panel with per-agent token usage and spend (currently derivable from per-session data)
- OAuth approval UI improvements
- API token rotation UI
Contributions are welcome. See CONTRIBUTING.md for setup instructions and guidelines.
To report a vulnerability, see SECURITY.md.
MIT © 2026 Builderz Labs
