Skip to content
View veighnsche's full-sized avatar

Block or report veighnsche

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
veighnsche/README.md

pronounced: Vinch

I’m a systems‑first builder focused on safety, determinism, and autonomy across OS tooling, AI infrastructure, and device‑level platforms. My work pairs deep systems engineering (Rust/Go, kernel/virtualization, packaging) with AI‑assisted workflows that stay auditable and reversible.

Projects

  • 🚀 LevitateOS — Daily driver Linux distro where you make your own package repo
  • 🌰 AcornOS — Alpine-based distribution with OpenRC, musl, and busybox
  • 🎮 rbee-keeper — Thin HTTP client (CLI + Tauri GUI) that manages queen lifecycle
  • 🎭 @cond8/core — TypeScript workflow framework with actor-director architecture
  • 🏗️ distro-builder — Shared component system and build abstractions for ISO creation
  • 📋 distro-spec — Constants for boot entries, partition layouts, user specs, and service management
  • 💿 leviso — Downloads Rocky Linux, extracts packages, builds bootable UEFI ISO with EROFS rootfs
  • 🔗 leviso-elf — Analyzes ELF binaries and copies library dependencies using readelf
  • 📦 recipe — Package manager where recipes are executable Rhai scripts with state in the files
  • 📥 recstrap — Extracts EROFS/squashfs to target directory with 14 safety checks
  • 📄 recfstab — Generates fstab entries from mounted filesystems
  • 🔐 recchroot — Sets up bind mounts and enters chroot with automatic cleanup
  • 🗜️ recinit — Builds initramfs images without root using pure Rust CPIO
  • 💽 reciso — Creates bootable UEFI ISOs from kernel + initramfs + rootfs with systemd-boot
  • 🖥️ recqemu — QEMU command builder with serial console and OVMF firmware discovery
  • 🎯 recuki — Builds Unified Kernel Images by wrapping systemd-ukify
  • 🧪 install-tests — E2E tests that boot ISO in QEMU, install, reboot, verify
  • rootfs-tests — User experience tests with systemd-nspawn for binaries, auth, filesystem
  • 🔌 hardware-compat — Hardware compatibility verification for modern CPUs/GPUs
  • 🛡️ cheat-guard — Runtime macros for error handling with documented invalid fixes
  • 🎭 cheat-test — Proc-macros that force documentation of how tests could be cheated
  • 🔍 fsdbg — Inspects and verifies archives (CPIO, EROFS, ISO) without extraction
  • 🌐 docs/website — Astro static site with dark/light theme at levitateos.org
  • 📚 docs/content — Structured documentation content library consumed by website and TUI
  • 🖼️ docs/tui — Terminal UI documentation viewer with Ink-based rendering
  • 🤖 llm-toolkit — LoRA fine-tuning scripts for training, inference, and evaluation
  • 👑 queen-rbee — Brain daemon with job-based architecture that routes to hives
  • 🏠 rbee-hive — Worker manager daemon that spawns workers and manages models per machine
  • 💬 llm-worker-rbee — LLM inference worker with llama.cpp backend (CUDA/Metal/CPU)
  • 🎨 sd-worker-rbee — Stable Diffusion worker for text-to-image generation
  • 🔌 rbee-openai-adapter — OpenAI API compatibility layer with SSE streaming
  • 📅 scheduler — Job scheduling and GPU allocation logic
  • 📊 telemetry-registry — Metrics collection and observability
  • 📦 artifact-catalog — Downloaded model artifact tracking
  • 🎮 device-detection — GPU detection for CUDA, Metal, ROCm, and CPU
  • 🗂️ model-catalog — SQLite model registry per hive
  • model-preloader — Background model downloading
  • 📥 model-provisioner — Model installation and verification
  • 💓 monitor — Worker health monitoring
  • 🔢 port-assigner — Dynamic port allocation for workers
  • 💾 vram-checker — GPU memory availability detection
  • 📒 worker-catalog — Active worker registry
  • ⚙️ worker-provisioner — Worker lifecycle management
  • 🔄 auto-update — Binary self-update mechanism
  • 🌍 env-config — Environment variable configuration
  • 💗 heartbeat-registry — Distributed heartbeat coordination
  • 📤 job-client — HTTP client for job submission
  • 🌐 job-server — HTTP server for job handling
  • 📝 narration-core — Logging and event narrative system
  • 🔑 ssh-config-parser — SSH config file parsing
  • ⏱️ timeout-enforcer — Timeout enforcement macros
  • timeout-enforcer-macros — Proc-macros for timeout annotations
  • 🔧 shared-worker-rbee — Common worker utilities
  • ♻️ lifecycle — Component lifecycle management
  • 📜 contracts — Shared type definitions
  • 🔒 security-crates — Auth, audit, and input validation crates
  • 🌍 global-worker-catalog — Cross-hive worker registry
  • 🌐 browser-environment — React + Vite web app with Monaco editor and AI chat
  • ☁️ VHX-starterkit — Cloudflare Workers template with Hono + Preact SSR
  • 🏰 sovereign-vault — Self-hosts Forgejo/Vaultwarden on Pixel 6 via AVF microVMs
  • 💎 Tanzanite — Aurora (uBlue) developer workstation image with COSMIC and toolchains
  • 🏆 tenxten — Proving ground for 10x engineers with native and AI-augmented certification
  • 🧹 nixos-ram-tmp-lru — NixOS module for tmpfs /tmp with LRU eviction at 70% usage
  • 🦀 oxidizr-arch — Atomically switches Arch toolchains to Rust replacements with rollback
  • 🔀 switchyard — Auditable engine for atomic system changes with symlink swaps
  • 🤖 android-root — MCP server for multi-device Android shells with hang detection
  • 🥒 cukerust — Zero-config Gherkin × Rust BDD extension for VS Code

Core strengths

  • Systems architecture with strong safety/rollback primitives
  • Linux distro + package engineering, immutable workflows, and build pipelines
  • AI infrastructure that is self‑hosted, offline‑capable, and composable
  • Device‑level security/virtualization (Android kernels, AVF, microVMs)

Typical stack

  • Rust, Go, Python, TypeScript
  • Linux / Nix / Fedora Atomic / Arch
  • Containers, microVMs, QEMU, ADB/fastboot

Project Analysis

Across the projects below, the through‑line is intentional automation with guardrails—build systems and infra that are powerful but always reversible.

  • Safety‑first system mutation: Switchyard‑fs and oxidizr‑arch show a consistent pattern of atomic changes, policy gates, and rollback.
  • Self‑hosted AI infrastructure: rbee emphasizes orchestration, multi‑GPU scheduling, and OpenAI‑compatible APIs without cloud lock‑in.
  • OS‑level product building: LevitateOS and Tanzanite combine distro engineering with developer‑first ergonomics and offline workflows.
  • Device‑scale isolation & control: sovereign‑vault and android‑root apply kernel/AVF foundations plus tooling to safely control Android hosts.
  • Developer experience tooling: cukerust and qemu‑screenshot‑mcp focus on tight feedback loops and agent‑friendly interfaces.

Contact

  • GitHub: @veighnsche

Pinned Loading

  1. rbee-keeper/rbee rbee-keeper/rbee Public

    Rust 29 2

  2. Cond8/core Cond8/core Public

    The core library and DSLM infrastructure

    TypeScript

  3. sovereign-vault sovereign-vault Public

    Go

  4. oxidizr-arch oxidizr-arch Public

    oxidizr-arch is a small, safety-first CLI that switches key system toolchains to their Rust replacements on Arch and derivatives (GNU coreutils → uutils-coreutils, findutils → uutils-findutils, sud…

    Rust 2

  5. Tanzanite Tanzanite Public

    ublue with cosmic

    Shell

  6. LevitateOS/LevitateOS LevitateOS/LevitateOS Public

    A Linux distribution where you maintain your own packages. Write simple Rhai recipes, build from source, with local AI assistance. Full control, no upstream dependencies.

    Shell 8