Summary
On OpenClaw 2026.3.13 in local loopback token-auth mode, we consistently hit a 3-stage auth/probe cascade:
token_missing (pre-auth rejection)
- post-auth scope gap (
scopes: [] / missing scope: operator.read)
- pairing-required state
Token-only Control UI sessions repeatedly hit stage 2. Paired-device auth is currently the only reliable control path.
Environment
- OpenClaw: 2026.3.13
- OS: Linux 6.8.0-101-generic (x64), node 22.22.1
- Gateway mode: local
- Gateway bind: loopback (
ws://127.0.0.1:18789)
- Gateway auth: token
- Channels enabled: Telegram + Discord
Observed behavior
openclaw gateway status shows runtime running and RPC probe: ok.
openclaw status --deep overview can simultaneously report gateway unreachable (missing scope: operator.read).
- Health table can still show gateway/channel reachable in the same window.
- Intermittent loopback WS churn also observed (
closed 1000, handshake timeout).
Expected behavior
- Token-authenticated local Control UI sessions should retain operator scopes consistently.
- Status/probe surfaces should not report contradictory health/scope states for the same runtime window.
Repro steps
- Start gateway in local loopback + token auth mode.
- Connect Control UI via token-only path.
- Run both:
openclaw gateway status
openclaw status --deep
- Observe scope/probe inconsistency and operator scope failures.
- Complete paired-device auth and verify control-path reliability improves.
Auth cascade model used in incident handling
- Stage 1
token_missing: rejected pre-auth (fix: provide token)
- Stage 2 post-auth scope gap: token accepted but no usable operator scope (no config-toggle workaround found)
- Stage 3
pairing required: identity present but pairing incomplete (fix: complete pairing)
Known references
Additional note
allowTailscale: true appears scoped to Tailscale identity flows and does not remediate token_missing or post-auth scope-gap failures in this loopback token-only path.
Summary
On OpenClaw 2026.3.13 in local loopback token-auth mode, we consistently hit a 3-stage auth/probe cascade:
token_missing(pre-auth rejection)scopes: []/missing scope: operator.read)Token-only Control UI sessions repeatedly hit stage 2. Paired-device auth is currently the only reliable control path.
Environment
ws://127.0.0.1:18789)Observed behavior
openclaw gateway statusshows runtime running andRPC probe: ok.openclaw status --deepoverview can simultaneously report gatewayunreachable (missing scope: operator.read).closed 1000, handshake timeout).Expected behavior
Repro steps
openclaw gateway statusopenclaw status --deepAuth cascade model used in incident handling
token_missing: rejected pre-auth (fix: provide token)pairing required: identity present but pairing incomplete (fix: complete pairing)Known references
Additional note
allowTailscale: trueappears scoped to Tailscale identity flows and does not remediatetoken_missingor post-auth scope-gap failures in this loopback token-only path.