Skip to content

2026.3.13 local loopback token-auth: post-auth scope gap (operator.read) + status/probe inconsistency #46716

@adamvandenbos

Description

@adamvandenbos

Summary

On OpenClaw 2026.3.13 in local loopback token-auth mode, we consistently hit a 3-stage auth/probe cascade:

  1. token_missing (pre-auth rejection)
  2. post-auth scope gap (scopes: [] / missing scope: operator.read)
  3. pairing-required state

Token-only Control UI sessions repeatedly hit stage 2. Paired-device auth is currently the only reliable control path.

Environment

  • OpenClaw: 2026.3.13
  • OS: Linux 6.8.0-101-generic (x64), node 22.22.1
  • Gateway mode: local
  • Gateway bind: loopback (ws://127.0.0.1:18789)
  • Gateway auth: token
  • Channels enabled: Telegram + Discord

Observed behavior

  • openclaw gateway status shows runtime running and RPC probe: ok.
  • openclaw status --deep overview can simultaneously report gateway unreachable (missing scope: operator.read).
  • Health table can still show gateway/channel reachable in the same window.
  • Intermittent loopback WS churn also observed (closed 1000, handshake timeout).

Expected behavior

  • Token-authenticated local Control UI sessions should retain operator scopes consistently.
  • Status/probe surfaces should not report contradictory health/scope states for the same runtime window.

Repro steps

  1. Start gateway in local loopback + token auth mode.
  2. Connect Control UI via token-only path.
  3. Run both:
    • openclaw gateway status
    • openclaw status --deep
  4. Observe scope/probe inconsistency and operator scope failures.
  5. Complete paired-device auth and verify control-path reliability improves.

Auth cascade model used in incident handling

  • Stage 1 token_missing: rejected pre-auth (fix: provide token)
  • Stage 2 post-auth scope gap: token accepted but no usable operator scope (no config-toggle workaround found)
  • Stage 3 pairing required: identity present but pairing incomplete (fix: complete pairing)

Known references

Additional note

allowTailscale: true appears scoped to Tailscale identity flows and does not remediate token_missing or post-auth scope-gap failures in this loopback token-only path.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions