security research, native Mac software, agent memory, local infra, and games that keep turning into systems projects
i build tools because the version i want usually does not exist yet. the work moves around a bit: macOS internals, agent memory, security research, origin servers, and sometimes a rhythm game that accidentally grows a backend.
most active right now: Junkstep - C++20/raylib rhythm battle game, early alpha. Apple Silicon builds, signed downloads, online accounts, chart rankings, bot battle, replays, hold notes, junk pressure, map transfer, and a backend that keeps getting less embarrassing.
| public work | what it is right now |
|---|---|
| kiln | native macOS app for agent CLIs like Claude Code and Codex. SwiftUI, Swift 6, Apple Silicon and Intel, release/update flow, sessions, approvals, local files, model controls. |
| Layerline | Zig origin server with virtual hosts, PHP/FastCGI, reverse proxying, TLS, admin controls, HTTP/2, and HTTP/3 work in tree. this is the part of the edge stack i want to own myself. |
| mythic | runtime layer above Engram: memory activation, cognitive cycles, reflection records, event streams, checkpoints, plugins, and resumable session state. |
| engram | memory system for agents with hybrid retrieval, graph context, MCP tools, docs, PyPI releases, and the local continuity stack i keep building around. |
| verge.raya.ac | public evidence/chamber work. source registers, claim threads, receipts, maps, and audit trails instead of screenshots floating around with no spine. |
| engram-cloud | hosted layer around Engram: workspaces, API keys, ingestion, usage tracking, dashboard surfaces, and bridge work. |
| work | shape |
|---|---|
| Junkstep / downloads | C++20/raylib rhythm battle game. early alpha, Apple Silicon builds, signed downloads, bot battle, replays, hold notes, junk pressure, online backend, website accounts, rankings, chat, and a lot of rough edges getting sanded down in real time. |
| Aurora / SRDPKit | local-first macOS security and infosec workbench. Apple baseline diffs, IOKit/SRDP research, safe tool registry, SwiftUI wrapper, Discord RPC, SecPulse/breach tooling, and a hard rule that risky probes stay gated. |
| Dawnline OS | Arch-based agent/workstation OS scaffold. archiso, rootfs targets, package groups, containerized builder flow, and Asahi/aarch64 planning. |
| SecPulse / Keyleak | responsible disclosure, leaked-secret triage, source handling, and operator workflows. some of it is public-facing, some of it stays private until it should not. |
| Apple security research | accepted reports, seasonal tagging/review, local baselines, and tooling for making the reports repeatable instead of just clever. |
| Warden | remote control stack over Tailscale with agent, CLI, web UI, and native Mac pieces. |
| project | notes |
|---|---|
| ember-cpu | 32-bit CPU from scratch with assembler, C compiler, JIT, and DOOM. |
| eero-mac | native macOS app for managing eero WiFi networks. |
| intellidash | global intelligence dashboard with live feeds, a local analyst, flight tracking, and native macOS pieces. |
| adelaide-metro-tracking | real-time public transport tracking for Adelaide. |
| neuro-memory | older cognitive memory system. a predecessor to the Engram/Mythic line. |
| Proton / wine | macOS ARM64 port spike around Proton/Wine. not a magic compatibility layer, just real port work and notes. |
public repositories 27
public non-fork repos 21
public counted lines 251,780
recent public work kiln, Layerline, mythic, engram, verge.raya.ac
current most active work Junkstep
private/local active work Aurora/SRDPKit, Dawnline OS, SecPulse, Warden
The line count is a practical source/text count, not a vanity metric. I skip lockfiles, vendored dependencies, generated bundles, binaries, minified assets, and similar noise. The private/local projects are not rolled into that public number.
languages swift python zig c++ typescript javascript go rust bash
apple swiftui appkit xpc app sandbox tcc iokit metal xcode
agents mcp embeddings retrieval memory systems event streams local models
security burp nuclei custom scanners source registers disclosure workflows
infra postgres docker cloudflare tailscale layerline nginx/caddy
games raylib realtime input chart importers replays multiplayer backends
accepted Apple Security Research reports
Apple SRDP work under review/tagging
reports across Apple, HackerOne, Bugcrowd, and direct disclosure
usual holes: CORS, authz, sandboxing, exposed secrets, client-side trust, platform weirdness
tools built along the way: Aurora/SRDPKit, SecPulse, Keyleak, ashforge, secprobe, bountytoolkit
I care less about making this sound impressive than making it checkable. The boring parts matter: source boundaries, exact repro steps, local baselines, saved artifacts, and knowing when not to run the dangerous thing.
- native apps when they make sense. web when it earns it.
- tools should be fast, direct, and slightly overbuilt in the places that save time later.
- i would rather ship the rough real thing than polish a fake demo.
- security research keeps turning into infrastructure. agent work keeps turning back into memory.
- if a system cannot be resumed by another session, it probably is not done yet.
- finishing Junkstep's early-alpha loop without letting the game feel like backend plumbing.
- making Kiln the Mac app i actually want for agent CLIs.
- pushing Layerline from "works" toward "i trust it in front of real sites".
- keeping Engram useful locally while Memorylayer grows around it.
- building Mythic as the runtime layer above memory, not another wrapper with a better name.
- turning Aurora/SRDPKit into a real local security workbench, not just a pile of scripts.
- keeping Apple security research grounded in baselines, repeatable probes, and clean reports.
site · junkstep · kiln · layerline · mythic · engram · verge
ask me about macOS internals, sandboxing, agent memory, origin servers, or why a rhythm game needs this much backend.
