Skip to content
View raya-ac's full-sized avatar
☺️
engram is live
☺️
engram is live

Block or report raya-ac

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
raya-ac/README.md

raya

security research, native Mac software, agent memory, local infra, and games that keep turning into systems projects

site junkstep kiln layerline mythic engram verge

i build tools because the version i want usually does not exist yet. the work moves around a bit: macOS internals, agent memory, security research, origin servers, and sometimes a rhythm game that accidentally grows a backend.


now

most active right now: Junkstep - C++20/raylib rhythm battle game, early alpha. Apple Silicon builds, signed downloads, online accounts, chart rankings, bot battle, replays, hold notes, junk pressure, map transfer, and a backend that keeps getting less embarrassing.

public work what it is right now
kiln native macOS app for agent CLIs like Claude Code and Codex. SwiftUI, Swift 6, Apple Silicon and Intel, release/update flow, sessions, approvals, local files, model controls.
Layerline Zig origin server with virtual hosts, PHP/FastCGI, reverse proxying, TLS, admin controls, HTTP/2, and HTTP/3 work in tree. this is the part of the edge stack i want to own myself.
mythic runtime layer above Engram: memory activation, cognitive cycles, reflection records, event streams, checkpoints, plugins, and resumable session state.
engram memory system for agents with hybrid retrieval, graph context, MCP tools, docs, PyPI releases, and the local continuity stack i keep building around.
verge.raya.ac public evidence/chamber work. source registers, claim threads, receipts, maps, and audit trails instead of screenshots floating around with no spine.
engram-cloud hosted layer around Engram: workspaces, API keys, ingestion, usage tracking, dashboard surfaces, and bridge work.

active, but not all public

work shape
Junkstep / downloads C++20/raylib rhythm battle game. early alpha, Apple Silicon builds, signed downloads, bot battle, replays, hold notes, junk pressure, online backend, website accounts, rankings, chat, and a lot of rough edges getting sanded down in real time.
Aurora / SRDPKit local-first macOS security and infosec workbench. Apple baseline diffs, IOKit/SRDP research, safe tool registry, SwiftUI wrapper, Discord RPC, SecPulse/breach tooling, and a hard rule that risky probes stay gated.
Dawnline OS Arch-based agent/workstation OS scaffold. archiso, rootfs targets, package groups, containerized builder flow, and Asahi/aarch64 planning.
SecPulse / Keyleak responsible disclosure, leaked-secret triage, source handling, and operator workflows. some of it is public-facing, some of it stays private until it should not.
Apple security research accepted reports, seasonal tagging/review, local baselines, and tooling for making the reports repeatable instead of just clever.
Warden remote control stack over Tailscale with agent, CLI, web UI, and native Mac pieces.

older but still mine

project notes
ember-cpu 32-bit CPU from scratch with assembler, C compiler, JIT, and DOOM.
eero-mac native macOS app for managing eero WiFi networks.
intellidash global intelligence dashboard with live feeds, a local analyst, flight tracking, and native macOS pieces.
adelaide-metro-tracking real-time public transport tracking for Adelaide.
neuro-memory older cognitive memory system. a predecessor to the Engram/Mythic line.
Proton / wine macOS ARM64 port spike around Proton/Wine. not a magic compatibility layer, just real port work and notes.

current public snapshot

public repositories        27
public non-fork repos      21
public counted lines       251,780
recent public work         kiln, Layerline, mythic, engram, verge.raya.ac
current most active work   Junkstep
private/local active work  Aurora/SRDPKit, Dawnline OS, SecPulse, Warden

The line count is a practical source/text count, not a vanity metric. I skip lockfiles, vendored dependencies, generated bundles, binaries, minified assets, and similar noise. The private/local projects are not rolled into that public number.


what i work with

languages      swift  python  zig  c++  typescript  javascript  go  rust  bash
apple          swiftui  appkit  xpc  app sandbox  tcc  iokit  metal  xcode
agents         mcp  embeddings  retrieval  memory systems  event streams  local models
security       burp  nuclei  custom scanners  source registers  disclosure workflows
infra          postgres  docker  cloudflare  tailscale  layerline  nginx/caddy
games          raylib  realtime input  chart importers  replays  multiplayer backends

security work

accepted Apple Security Research reports
Apple SRDP work under review/tagging
reports across Apple, HackerOne, Bugcrowd, and direct disclosure
usual holes: CORS, authz, sandboxing, exposed secrets, client-side trust, platform weirdness
tools built along the way: Aurora/SRDPKit, SecPulse, Keyleak, ashforge, secprobe, bountytoolkit

I care less about making this sound impressive than making it checkable. The boring parts matter: source boundaries, exact repro steps, local baselines, saved artifacts, and knowing when not to run the dangerous thing.


working style

  • native apps when they make sense. web when it earns it.
  • tools should be fast, direct, and slightly overbuilt in the places that save time later.
  • i would rather ship the rough real thing than polish a fake demo.
  • security research keeps turning into infrastructure. agent work keeps turning back into memory.
  • if a system cannot be resumed by another session, it probably is not done yet.

current focus

  • finishing Junkstep's early-alpha loop without letting the game feel like backend plumbing.
  • making Kiln the Mac app i actually want for agent CLIs.
  • pushing Layerline from "works" toward "i trust it in front of real sites".
  • keeping Engram useful locally while Memorylayer grows around it.
  • building Mythic as the runtime layer above memory, not another wrapper with a better name.
  • turning Aurora/SRDPKit into a real local security workbench, not just a pile of scripts.
  • keeping Apple security research grounded in baselines, repeatable probes, and clean reports.

site · junkstep · kiln · layerline · mythic · engram · verge

ask me about macOS internals, sandboxing, agent memory, origin servers, or why a rhythm game needs this much backend.

Pinned Loading

  1. engram engram Public

    Memory system for AI agents with hybrid retrieval, MCP tooling, and LongMemEval-leading performance.

    Python 1

  2. neuro-memory neuro-memory Public

    4-Layer Cognitive Memory System for AI Agents

    Python

  3. kiln kiln Public

    A native macOS app for agent CLIs like Claude Code and Codex. SwiftUI, Swift 6, Apple Silicon + Intel.

    Swift 1

  4. Layerline Layerline Public

    Origin-surface Zig web server with virtual hosts, PHP/FastCGI, reverse proxying, TLS, admin controls, HTTP/2, and in-tree HTTP/3 work.

    Zig 1