security research, agent memory, native Mac apps, and tools that usually start as "this should exist"
I build security tools, memory infrastructure for agents, and Mac software. A lot of it comes from getting annoyed at existing tooling and deciding to make the version I wanted.
|
|
| project | what it is | status |
|---|---|---|
| Memorylayer | Hosted service layer for Engram: workspaces, API keys, ingestion, usage logs, starter skills, and a dashboard. | live at memorylayer.run |
| Engram | Memory system for agents. Hybrid retrieval, MCP tooling, graph context, docs, and benchmarks. | active |
| Kiln | Native macOS app for agent CLIs like Claude Code and Codex. Local files, chat, approvals, sessions, model controls, and release tooling. | active |
| SecPulse | Responsible disclosure platform and secret triage stack. This is where Keyleak work lands now. | live |
| Warden | Remote control stack over Tailscale, with agent, CLI, web UI, and Mac app pieces. | active |
| payphone-territory | Messaging and communications infrastructure. Twilio-shaped, but getting broader. | active |
| sigint | Monitoring and situational-awareness tooling, plus a few jokes that probably went too far. | active |
| eero-mac | Native macOS app for managing eero WiFi networks. | active |
| ember-cpu | 32-bit CPU from scratch with assembler, C compiler, JIT, and DOOM. | systems project |
languages swift python javascript c++ metal go bash
apple swiftui appkit app sandbox xpc metal xcode
security burp nuclei custom scanners disclosure workflows
agents mcp retrieval embeddings memory systems local models
infra postgres docker cloudflare tailscale vps nginx/caddy
accepted Apple Security Research reports
Spring 2026-tagged Apple reports
26 total reports across Apple SRDP, HackerOne, Bugcrowd, and direct disclosure
targets include Apple, Netflix, Coinbase, Stripe, Monzo, Twilio, Grab, and Atlassian
tools built along the way: SecPulse, Keyleak, ashforge, secprobe, bountytoolkit
- I like native apps when they make sense. Web wrappers usually annoy me.
- I care about tools feeling fast, direct, and a little overbuilt in the right places.
- Security research keeps pulling me into infrastructure. Agent work keeps pulling me back into memory and retrieval.
- I prefer shipping something real, then sanding down the rough edges in public.
- Making Memorylayer feel like a real hosted memory service for agents.
- Keeping Engram useful locally and hosted, without turning it into a fake SaaS abstraction.
- Turning Kiln into the Mac app I want for Claude, Codex, and whatever agent CLI comes next.
- Building SecPulse into a cleaner disclosure workflow with useful security tooling around it.
- Continuing Apple security research as accepted reports move through seasonal tagging.
site · memorylayer · engram · secpulse · kiln
Ask me about macOS internals, sandboxing, agent memory, or why I keep starting infrastructure projects at 2am.
