@heretek-ai/clawbridge-dashboard
v1.0.0
Published
ClawBridge mobile-first dashboard integration for Heretek OpenClaw
Readme
ClawBridge Dashboard Integration
Package: clawbridge-dashboard
Source: https://github.com/dreamwing/clawbridge
License: MIT
Stats: 212 stars, 22 forks
Status: Active (Official Project)
Overview
ClawBridge is a mobile-first dashboard for OpenClaw that provides zero-config remote access via Cloudflare tunnels. This integration package provides configuration templates and setup automation for Heretek OpenClaw.
Key Features
- Mobile-first PWA design - Optimized for mobile browsers with offline support
- Zero-config remote access - Cloudflare Tunnel integration for secure remote connectivity
- Live activity feed - WebSocket-based real-time event streaming
- Token economy tracking - Monitor token usage and costs across agents
- Cost Control Center - 10 automated cost diagnostics
- Memory timeline view - Visual timeline of episodic memories
- Mission control - Trigger cron jobs, restart services, manage agents
Installation
Quick Install (One-liner)
curl -sL https://clawbridge.app/install.sh | bashManual Installation
# Clone the repository
git clone https://github.com/dreamwing/clawbridge.git
cd clawbridge
# Install dependencies
npm install
# Copy configuration
cp .env.example .envConfiguration
Environment Variables
# ClawBridge Configuration
CLAWBRIDGE_PORT=3000
CLAWBRIDGE_HOST=0.0.0.0
# OpenClaw Gateway Connection
OPENCLAW_GATEWAY_URL=http://localhost:18789
OPENCLAW_ACCESS_KEY=your-access-key-here
# Cloudflare Tunnel (optional - for remote access)
CLOUDFLARE_TUNNEL_ENABLED=true
CLOUDFLARE_TUNNEL_DOMAIN=your-domain.trycloudflare.com
# Authentication
AUTH_TYPE=access-key
SESSION_TIMEOUT=3600Access Key Setup
- Generate an access key:
openssl rand -hex 32- Add to
.env:
CLAWBRIDGE_ACCESS_KEY=<generated-key>- Configure in OpenClaw Gateway (
openclaw.json):
{
"dashboard": {
"clawbridge": {
"enabled": true,
"accessKey": "<your-access-key>",
"allowedOrigins": ["https://your-domain.trycloudflare.com"]
}
}
}Cloudflare Tunnel Setup
ClawBridge uses Cloudflare Tunnel for secure remote access without port forwarding.
Automatic Setup
# Enable tunnel during installation
curl -sL https://clawbridge.app/install.sh | bash -s -- --tunnelManual Setup
- Install cloudflared:
# Linux
curl -L --output cloudflared.deb https://github.com/cloudflare/cloudflared/releases/latest/download/cloudflared-linux-amd64.deb
sudo dpkg -i cloudflared.deb
# macOS
brew install cloudflared- Create tunnel:
cloudflared tunnel create clawbridge- Configure tunnel (
~/.cloudflared/config.yml):
tunnel: clawbridge
credentials-file: /root/.cloudflared/tunnel-credentials.json
ingress:
- hostname: your-domain.trycloudflare.com
service: http://localhost:3000
- service: http_status:404- Run tunnel:
cloudflared tunnel run clawbridgePersistent Tunnel (systemd)
# Create service file
sudo nano /etc/systemd/system/cloudflared-clawbridge.service[Unit]
Description=Cloudflare Tunnel for ClawBridge
After=network.target
[Service]
Type=simple
User=root
ExecStart=/usr/local/bin/cloudflared tunnel run clawbridge
Restart=always
[Install]
WantedBy=multi-user.target# Enable and start
sudo systemctl enable cloudflared-clawbridge
sudo systemctl start cloudflared-clawbridgeUsage
Start ClawBridge
# Development mode
npm run dev
# Production mode
npm start
# With Docker
docker-compose up -dAccess Dashboard
- Local: http://localhost:3000
- Remote: https://your-domain.trycloudflare.com
Mobile PWA
- Open ClawBridge on mobile browser
- Tap "Add to Home Screen"
- Launch as standalone app
Features
Live Activity Feed
Real-time WebSocket streaming of:
- Agent messages
- Skill executions
- Token usage events
- System events
Cost Control Center
10 automated diagnostics:
- High token usage detection
- Cost spike alerts
- Model efficiency analysis
- Idle agent detection
- Redundant skill execution
- Rate limit monitoring
- Budget threshold alerts
- Cost per agent breakdown
- Cost per skill breakdown
- Historical cost trends
Memory Timeline
- Episodic memory visualization
- Semantic knowledge promotion tracking
- Dreamer consolidation events
Mission Control
- Trigger cron jobs
- Restart agents
- Service health monitoring
- Emergency shutdown
Security
Access Key Authentication
ClawBridge uses access key authentication for API access:
// API request example
fetch('http://localhost:3000/api/agents', {
headers: {
'Authorization': 'Bearer your-access-key'
}
});Tunnel Security
- Cloudflare Tunnel encrypts all traffic
- No open ports on firewall
- Zero Trust network access
- DDoS protection via Cloudflare
Best Practices
- Never commit
.env- Contains access keys - Rotate keys regularly - Generate new keys periodically
- Restrict origins - Configure allowed CORS origins
- Enable audit logging - Track all dashboard actions
Integration with Heretek OpenClaw
Gateway Configuration
Add to openclaw.json:
{
"dashboard": {
"clawbridge": {
"enabled": true,
"port": 3000,
"accessKey": "${CLAWBRIDGE_ACCESS_KEY}",
"cloudflareTunnel": {
"enabled": true,
"domain": "${CLOUDFLARE_TUNNEL_DOMAIN}"
}
}
}
}Agent Integration
Agents can emit events to ClawBridge:
// Emit event to dashboard
gateway.emit('dashboard:event', {
type: 'skill_execution',
agent: 'explorer',
skill: 'opportunity-scanner',
status: 'completed',
timestamp: Date.now()
});Troubleshooting
Tunnel Not Connecting
# Check tunnel status
cloudflared tunnel list
# View tunnel logs
cloudflared tunnel info clawbridgeAccess Denied
- Verify access key in
.env - Check key matches Gateway configuration
- Regenerate key if needed
WebSocket Connection Failed
- Check ClawBridge is running
- Verify port 3000 is accessible
- Check firewall settings
References
- ClawBridge Repository
- Cloudflare Tunnel Documentation
- Heretek DEPLOYMENT.md
- EXTERNAL_PROJECTS_GAP_ANALYSIS.md
🦞 Bridge to your collective, anywhere.
