Skip to content
View raya-ac's full-sized avatar
☺️
engram is live
☺️
engram is live

Block or report raya-ac

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
raya-ac/README.md

raya

security research, agent memory, native Mac apps, and tools that usually start as "this should exist"

site memorylayer engram secpulse kiln

security research agent memory native macOS security tools

I build security tools, memory infrastructure for agents, and Mac software. A lot of it comes from getting annoyed at existing tooling and deciding to make the version I wanted.


Now

Shipping

  • Memorylayer - hosted Engram workspaces, GitHub login, API keys, ingestion, usage tracking, and a small MCP-style bridge.

  • Engram - persistent memory for agents, with retrieval, graph context, MCP tools, and PyPI releases.

  • Kiln - a native macOS front-end for agent CLIs, now with Claude and Codex support.

  • SecPulse - responsible disclosure and secret triage tooling. SecPulse and Keyleak are the same line of work now.

Security Research

  • Apple Security Research reports accepted.

  • Apple work tagged for Spring 2026.

  • 26 reports across Apple SRDP, HackerOne, Bugcrowd, and direct disclosure.

  • Usual rabbit holes: CORS, authz, sandboxing, client-side bugs, exposed secrets, and weird platform behavior.


Projects

project what it is status
Memorylayer Hosted service layer for Engram: workspaces, API keys, ingestion, usage logs, starter skills, and a dashboard. live at memorylayer.run
Engram Memory system for agents. Hybrid retrieval, MCP tooling, graph context, docs, and benchmarks. active
Kiln Native macOS app for agent CLIs like Claude Code and Codex. Local files, chat, approvals, sessions, model controls, and release tooling. active
SecPulse Responsible disclosure platform and secret triage stack. This is where Keyleak work lands now. live
Warden Remote control stack over Tailscale, with agent, CLI, web UI, and Mac app pieces. active
payphone-territory Messaging and communications infrastructure. Twilio-shaped, but getting broader. active
sigint Monitoring and situational-awareness tooling, plus a few jokes that probably went too far. active
eero-mac Native macOS app for managing eero WiFi networks. active
ember-cpu 32-bit CPU from scratch with assembler, C compiler, JIT, and DOOM. systems project

What I Work With

languages      swift  python  javascript  c++  metal  go  bash
apple          swiftui  appkit  app sandbox  xpc  metal  xcode
security       burp  nuclei  custom scanners  disclosure workflows
agents         mcp  retrieval  embeddings  memory systems  local models
infra          postgres  docker  cloudflare  tailscale  vps  nginx/caddy

Security Work

accepted Apple Security Research reports
Spring 2026-tagged Apple reports
26 total reports across Apple SRDP, HackerOne, Bugcrowd, and direct disclosure
targets include Apple, Netflix, Coinbase, Stripe, Monzo, Twilio, Grab, and Atlassian
tools built along the way: SecPulse, Keyleak, ashforge, secprobe, bountytoolkit

Working Style

  • I like native apps when they make sense. Web wrappers usually annoy me.
  • I care about tools feeling fast, direct, and a little overbuilt in the right places.
  • Security research keeps pulling me into infrastructure. Agent work keeps pulling me back into memory and retrieval.
  • I prefer shipping something real, then sanding down the rough edges in public.

Current Focus

  • Making Memorylayer feel like a real hosted memory service for agents.
  • Keeping Engram useful locally and hosted, without turning it into a fake SaaS abstraction.
  • Turning Kiln into the Mac app I want for Claude, Codex, and whatever agent CLI comes next.
  • Building SecPulse into a cleaner disclosure workflow with useful security tooling around it.
  • Continuing Apple security research as accepted reports move through seasonal tagging.

site · memorylayer · engram · secpulse · kiln

Ask me about macOS internals, sandboxing, agent memory, or why I keep starting infrastructure projects at 2am.

Pinned Loading

  1. engram engram Public

    Memory system for AI agents with hybrid retrieval, MCP tooling, and LongMemEval-leading performance.

    Python 1

  2. neuro-memory neuro-memory Public

    4-Layer Cognitive Memory System for AI Agents

    Python

  3. kiln kiln Public

    A native macOS app for agent CLIs like Claude Code and Codex. SwiftUI, Swift 6, Apple Silicon + Intel.

    Swift 1

  4. Layerline Layerline Public

    Origin-surface Zig web server with virtual hosts, PHP/FastCGI, reverse proxying, TLS, admin controls, HTTP/2, and in-tree HTTP/3 work.

    Zig