LIVE TAPE
OpenClaw 88,412 stars·CVE-2026-25898 disclosed (HIGH, Hermes)·Hermes Agent v2026.4.7 published·Hermes Agent +182 stars (last hour)·OpenClaw v2026.4.6 — credential vault hardening·CVE-2026-26133 patched (NanoClaw)·Pi 5 16GB rumoured for Q3 — recheck guidance·Nanobot +47 stars (last hour)·ZeroClaw v0.4.2 — Apple container fixes·Mac Mini M4 wins quarterly hardware survey·OpenClaw 88,412 stars·CVE-2026-25898 disclosed (HIGH, Hermes)·Hermes Agent v2026.4.7 published·Hermes Agent +182 stars (last hour)·OpenClaw v2026.4.6 — credential vault hardening·CVE-2026-26133 patched (NanoClaw)·Pi 5 16GB rumoured for Q3 — recheck guidance·Nanobot +47 stars (last hour)·ZeroClaw v0.4.2 — Apple container fixes·Mac Mini M4 wins quarterly hardware survey·
PocketClawvol. 1 · 2026

Caddy reverse proxy with HTTPS for a self-hosted AI dashboard

Front your agent dashboard with Caddy on port 443 with automatic HTTPS via Let's Encrypt — no certbot, no nginx config.

Prerequisites

  • A Linux host with a public IP and a domain pointed at it (A record)
  • An agent running on the host on a non-standard port (e.g. 8765)
  • Ports 80 and 443 open on the host firewall

Steps

  1. Install Caddy

    Use the official Debian/Ubuntu repository. Caddy 2.x is the version we want.

    sudo apt install -y debian-keyring debian-archive-keyring apt-transport-https
    curl -1sLf 'https://dl.cloudsmith.io/public/caddy/stable/gpg.key' | sudo gpg --dearmor -o /usr/share/keyrings/caddy-stable-archive-keyring.gpg
    curl -1sLf 'https://dl.cloudsmith.io/public/caddy/stable/debian.deb.txt' | sudo tee /etc/apt/sources.list.d/caddy-stable.list
    sudo apt update
    sudo apt install caddy
  2. Write the Caddyfile

    The simplest possible Caddyfile that fronts your agent on port 443 with auto-HTTPS.

    sudo tee /etc/caddy/Caddyfile <<'EOF'
    agent.yourdomain.com {
        reverse_proxy localhost:8765
    }
    EOF
    
    sudo systemctl reload caddy
  3. Verify HTTPS works

    Caddy will request a Let's Encrypt certificate automatically on first request. Check by curling.

    curl -I https://agent.yourdomain.com
    # Should return HTTP 200 or 401 (auth) — the certificate should be valid.
  4. Lock down with basic auth (recommended even with Tailscale)

    Add basic auth on top of the agent's own auth as defence in depth.

    # Generate a hashed password:
    caddy hash-password
    # Enter your password, copy the output.
    
    sudo tee /etc/caddy/Caddyfile <<'EOF'
    agent.yourdomain.com {
        basicauth {
            admin <hashed-password-from-above>
        }
        reverse_proxy localhost:8765
    }
    EOF
    
    sudo systemctl reload caddy

Troubleshooting

Certificate fails to issue
Most common: the domain DNS doesn't actually point to this server (yet). Check `dig agent.yourdomain.com` returns the right IP. Also verify ports 80 and 443 are reachable from the public internet (`curl -I http://agent.yourdomain.com`).
Caddy reload fails
Check `caddy validate --config /etc/caddy/Caddyfile`. Most syntax errors show clearly there.

Where to go from here

Put the dashboard behind Tailscale instead of public auth — it's a stronger security boundary than basic auth. The Caddy + HTTPS setup is more useful for public services (status pages, API endpoints meant to be public).

Other tutorials
intermediate
Hermes Agent on a Raspberry Pi 5
End-to-end install of Hermes Agent on a fresh Raspberry Pi 5 (8 GB), accessed via Tailscale, with Cl…
beginner
Tailscale for self-hosted AI dashboards
Set up Tailscale to access your agent dashboard from anywhere without exposing it on the public inte…
intermediate
Ollama + Phi-3 mini on a Raspberry Pi 5
Install Ollama and the smallest credible local LLM (Phi-3 mini 3.8B Q4) on a Raspberry Pi 5. Useful …
intermediate
Migrate OpenClaw to Hermes Agent — step by step
Concrete migration path with shell commands. Snapshot OpenClaw, install Hermes, port tools, migrate …