The Gateway is OpenClaw’s WebSocket server (channels, nodes, sessions, hooks). Subcommands in this page live underDocumentation Index
Fetch the complete documentation index at: https://docs.openclaw.ai/llms.txt
Use this file to discover all available pages before exploring further.
openclaw gateway ….
Bonjour discovery
Local mDNS + wide-area DNS-SD setup.
Discovery overview
How OpenClaw advertises and finds gateways.
Configuration
Top-level gateway config keys.
Run the Gateway
Run a local Gateway process:Startup behavior
Startup behavior
- By default, the Gateway refuses to start unless
gateway.mode=localis set in~/.openclaw/openclaw.json. Use--allow-unconfiguredfor ad-hoc/dev runs. openclaw onboard --mode localandopenclaw setupare expected to writegateway.mode=local. If the file exists butgateway.modeis missing, treat that as a broken or clobbered config and repair it instead of assuming local mode implicitly.- If the file exists and
gateway.modeis missing, the Gateway treats that as suspicious config damage and refuses to “guess local” for you. - Binding beyond loopback without auth is blocked (safety guardrail).
SIGUSR1triggers an in-process restart when authorized (commands.restartis enabled by default; setcommands.restart: falseto block manual restart, while gateway tool/config apply/update remain allowed).SIGINT/SIGTERMhandlers stop the gateway process, but they don’t restore any custom terminal state. If you wrap the CLI with a TUI or raw-mode input, restore the terminal before exit.
Options
WebSocket port (default comes from config/env; usually
18789).Listener bind mode.
Auth mode override.
Token override (also sets
OPENCLAW_GATEWAY_TOKEN for the process).Password override.
Read the gateway password from a file.
Expose the Gateway via Tailscale.
Reset Tailscale serve/funnel config on shutdown.
Allow gateway start without
gateway.mode=local in config. Bypasses the startup guard for ad-hoc/dev bootstrap only; does not write or repair the config file.Create a dev config + workspace if missing (skips BOOTSTRAP.md).
Reset dev config + credentials + sessions + workspace (requires
--dev).Kill any existing listener on the selected port before starting.
Verbose logs.
Only show CLI backend logs in the console (and enable stdout/stderr).
Websocket log style.
Alias for
--ws-log compact.Log raw model stream events to jsonl.
Raw stream jsonl path.
Startup profiling
- Set
OPENCLAW_GATEWAY_STARTUP_TRACE=1to log phase timings during Gateway startup, including per-phaseeventLoopMaxdelay and plugin lookup-table timings for installed-index, manifest registry, startup planning, and owner-map work. - Run
pnpm test:startup:gateway -- --runs 5 --warmup 1to benchmark Gateway startup. The benchmark records first process output,/healthz,/readyz, startup trace timings, event-loop delay, and plugin lookup-table timing details.
Query a running Gateway
All query commands use WebSocket RPC.- Output modes
- Default: human-readable (colored in TTY).
--json: machine-readable JSON (no styling/spinner).--no-color(orNO_COLOR=1): disable ANSI while keeping human layout.
When you set
--url, the CLI does not fall back to config or environment credentials. Pass --token or --password explicitly. Missing explicit credentials is an error.gateway health
/healthz endpoint is a liveness probe: it returns once the server can answer HTTP. The HTTP /readyz endpoint is stricter and stays red while startup sidecars, channels, or configured hooks are still settling. Local or authenticated detailed readiness responses include an eventLoop diagnostic block with event-loop delay, event-loop utilization, CPU core ratio, and a degraded flag.
gateway usage-cost
Fetch usage-cost summaries from session logs.
Number of days to include.
gateway stability
Fetch the recent diagnostic stability recorder from a running Gateway.
Maximum number of recent events to include (max
1000).Filter by diagnostic event type, such as
payload.large or diagnostic.memory.pressure.Include only events after a diagnostic sequence number.
Read a persisted stability bundle instead of calling the running Gateway. Use
--bundle latest (or just --bundle) for the newest bundle under the state directory, or pass a bundle JSON path directly.Write a shareable support diagnostics zip instead of printing stability details.
Output path for
--export.Privacy and bundle behavior
Privacy and bundle behavior
- Records keep operational metadata: event names, counts, byte sizes, memory readings, queue/session state, channel/plugin names, and redacted session summaries. They do not keep chat text, webhook bodies, tool outputs, raw request or response bodies, tokens, cookies, secret values, hostnames, or raw session ids. Set
diagnostics.enabled: falseto disable the recorder entirely. - On fatal Gateway exits, shutdown timeouts, and restart startup failures, OpenClaw writes the same diagnostic snapshot to
~/.openclaw/logs/stability/openclaw-stability-*.jsonwhen the recorder has events. Inspect the newest bundle withopenclaw gateway stability --bundle latest;--limit,--type, and--since-seqalso apply to bundle output.
gateway diagnostics export
Write a local diagnostics zip that is designed to attach to bug reports. For the privacy model and bundle contents, see Diagnostics Export.
Output zip path. Defaults to a support export under the state directory.
Maximum sanitized log lines to include.
Maximum log bytes to inspect.
Gateway WebSocket URL for the health snapshot.
Gateway token for the health snapshot.
Gateway password for the health snapshot.
Status/health snapshot timeout.
Skip persisted stability bundle lookup.
Print the written path, size, and manifest as JSON.
gateway status
gateway status shows the Gateway service (launchd/systemd/schtasks) plus an optional probe of connectivity/auth capability.
Add an explicit probe target. Configured remote + localhost are still probed.
Token auth for the probe.
Password auth for the probe.
Probe timeout.
Skip the connectivity probe (service-only view).
Scan system-level services too.
Upgrade the default connectivity probe to a read probe and exit non-zero when that read probe fails. Cannot be combined with
--no-probe.Status semantics
Status semantics
gateway statusstays available for diagnostics even when the local CLI config is missing or invalid.- Default
gateway statusproves service state, WebSocket connect, and the auth capability visible at handshake time. It does not prove read/write/admin operations. - Diagnostic probes are non-mutating for first-time device auth: they reuse an existing cached device token when one exists, but they do not create a new CLI device identity or read-only device pairing record just to check status.
gateway statusresolves configured auth SecretRefs for probe auth when possible.- If a required auth SecretRef is unresolved in this command path,
gateway status --jsonreportsrpc.authWarningwhen probe connectivity/auth fails; pass--token/--passwordexplicitly or resolve the secret source first. - If the probe succeeds, unresolved auth-ref warnings are suppressed to avoid false positives.
- Use
--require-rpcin scripts and automation when a listening service is not enough and you need read-scope RPC calls to be healthy too. --deepadds a best-effort scan for extra launchd/systemd/schtasks installs. When multiple gateway-like services are detected, human output prints cleanup hints and warns that most setups should run one gateway per machine.- Human output includes the resolved file log path plus the CLI-vs-service config paths/validity snapshot to help diagnose profile or state-dir drift.
Linux systemd auth-drift checks
Linux systemd auth-drift checks
- On Linux systemd installs, service auth drift checks read both
Environment=andEnvironmentFile=values from the unit (including%h, quoted paths, multiple files, and optional-files). - Drift checks resolve
gateway.auth.tokenSecretRefs using merged runtime env (service command env first, then process env fallback). - If token auth is not effectively active (explicit
gateway.auth.modeofpassword/none/trusted-proxy, or mode unset where password can win and no token candidate can win), token-drift checks skip config token resolution.
gateway probe
gateway probe is the “debug everything” command. It always probes:
- your configured remote gateway (if set), and
- localhost (loopback) even if remote is configured.
--url, that explicit target is added ahead of both. Human output labels the targets as:
URL (explicit)Remote (configured)orRemote (configured, inactive)Local loopback
If multiple gateways are reachable, it prints all of them. Multiple gateways are supported when you use isolated profiles/ports (e.g., a rescue bot), but most installs still run a single gateway.
Interpretation
Interpretation
Reachable: yesmeans at least one target accepted a WebSocket connect.Capability: read-only|write-capable|admin-capable|pairing-pending|connect-onlyreports what the probe could prove about auth. It is separate from reachability.Read probe: okmeans read-scope detail RPC calls (health/status/system-presence/config.get) also succeeded.Read probe: limited - missing scope: operator.readmeans connect succeeded but read-scope RPC is limited. This is reported as degraded reachability, not full failure.Read probe: failedafterConnect: okmeans the Gateway accepted the WebSocket connection, but follow-up read diagnostics timed out or failed. This is also degraded reachability, not an unreachable Gateway.- Like
gateway status, probe reuses existing cached device auth but does not create first-time device identity or pairing state. - Exit code is non-zero only when no probed target is reachable.
JSON output
JSON output
Top level:
ok: at least one target is reachable.degraded: at least one target accepted a connection but did not complete full detail RPC diagnostics.capability: best capability seen across reachable targets (read_only,write_capable,admin_capable,pairing_pending,connected_no_operator_scope, orunknown).primaryTargetId: best target to treat as the active winner in this order: explicit URL, SSH tunnel, configured remote, then local loopback.warnings[]: best-effort warning records withcode,message, and optionaltargetIds.network: local loopback/tailnet URL hints derived from current config and host networking.discovery.timeoutMsanddiscovery.count: the actual discovery budget/result count used for this probe pass.
targets[].connect):ok: reachability after connect + degraded classification.rpcOk: full detail RPC success.scopeLimited: detail RPC failed due to missing operator scope.
targets[].auth):role: auth role reported inhello-okwhen available.scopes: granted scopes reported inhello-okwhen available.capability: the surfaced auth capability classification for that target.
Common warning codes
Common warning codes
ssh_tunnel_failed: SSH tunnel setup failed; the command fell back to direct probes.multiple_gateways: more than one target was reachable; this is unusual unless you intentionally run isolated profiles, such as a rescue bot.auth_secretref_unresolved: a configured auth SecretRef could not be resolved for a failed target.probe_scope_limited: WebSocket connect succeeded, but the read probe was limited by missingoperator.read.
Remote over SSH (Mac app parity)
The macOS app “Remote over SSH” mode uses a local port-forward so the remote gateway (which may be bound to loopback only) becomes reachable atws://127.0.0.1:<port>.
CLI equivalent:
user@host or user@host:port (port defaults to 22).Identity file.
Pick the first discovered gateway host as SSH target from the resolved discovery endpoint (
local. plus the configured wide-area domain, if any). TXT-only hints are ignored.gateway.remote.sshTargetgateway.remote.sshIdentity
gateway call <method>
Low-level RPC helper.
JSON object string for params.
Gateway WebSocket URL.
Gateway token.
Gateway password.
Timeout budget.
Mainly for agent-style RPCs that stream intermediate events before a final payload.
Machine-readable JSON output.
--params must be valid JSON.Manage the Gateway service
Install with a wrapper
Use--wrapper when the managed service must start through another executable, for example a
secrets manager shim or a run-as helper. The wrapper receives the normal Gateway args and is
responsible for eventually exec’ing openclaw or Node with those args.
gateway install validates that the path is
an executable file, writes the wrapper into service ProgramArguments, and persists
OPENCLAW_WRAPPER in the service environment for later forced reinstalls, updates, and doctor
repairs.
OPENCLAW_WRAPPER while reinstalling:
Command options
Command options
gateway status:--url,--token,--password,--timeout,--no-probe,--require-rpc,--deep,--jsongateway install:--port,--runtime <node|bun>,--token,--wrapper <path>,--force,--jsongateway uninstall|start|stop|restart:--json
Lifecycle behavior
Lifecycle behavior
- Use
gateway restartto restart a managed service. Do not chaingateway stopandgateway startas a restart substitute; on macOS,gateway stopintentionally disables the LaunchAgent before stopping it. - Lifecycle commands accept
--jsonfor scripting.
Auth and SecretRefs at install time
Auth and SecretRefs at install time
- When token auth requires a token and
gateway.auth.tokenis SecretRef-managed,gateway installvalidates that the SecretRef is resolvable but does not persist the resolved token into service environment metadata. - If token auth requires a token and the configured token SecretRef is unresolved, install fails closed instead of persisting fallback plaintext.
- For password auth on
gateway run, preferOPENCLAW_GATEWAY_PASSWORD,--password-file, or a SecretRef-backedgateway.auth.passwordover inline--password. - In inferred auth mode, shell-only
OPENCLAW_GATEWAY_PASSWORDdoes not relax install token requirements; use durable config (gateway.auth.passwordor configenv) when installing a managed service. - If both
gateway.auth.tokenandgateway.auth.passwordare configured andgateway.auth.modeis unset, install is blocked until mode is set explicitly.
Discover gateways (Bonjour)
gateway discover scans for Gateway beacons (_openclaw-gw._tcp).
- Multicast DNS-SD:
local. - Unicast DNS-SD (Wide-Area Bonjour): choose a domain (example:
openclaw.internal.) and set up split DNS + a DNS server; see Bonjour.
role(gateway role hint)transport(transport hint, e.g.gateway)gatewayPort(WebSocket port, usually18789)sshPort(optional; clients default SSH targets to22when it is absent)tailnetDns(MagicDNS hostname, when available)gatewayTls/gatewayTlsSha256(TLS enabled + cert fingerprint)cliPath(remote-install hint written to the wide-area zone)
gateway discover
Per-command timeout (browse/resolve).
Machine-readable output (also disables styling/spinner).
- The CLI scans
local.plus the configured wide-area domain when one is enabled. wsUrlin JSON output is derived from the resolved service endpoint, not from TXT-only hints such aslanHostortailnetDns.- On
local.mDNS,sshPortandcliPathare only broadcast whendiscovery.mdns.modeisfull. Wide-area DNS-SD still writescliPath;sshPortstays optional there too.