405d Website
Production platform supporting a federal healthcare cybersecurity program, built to meet government security, reliability, and operational compliance requirements. Source code is private due to contract restrictions.
AI RAG Platform System
Reference implementation of a deterministic, citation-constrained retrieval-augmented generation system with in-memory vector indexing, cosine similarity ranking, and browser-visible source verification.
ESP32 Relay Firmware (Waveshare)
The stock Waveshare firmware works for demos, but assumes ideal power delivery, permissive BLE control, and continuous polling loops. Under real relay load this can result in watchdog resets, brownouts, and unauthenticated control paths.
This project is an independent ESP32 firmware implementation focused on authenticated BLE commands, deterministic FreeRTOS task structure, controlled logging, and power-aware behavior on constrained hardware.
Derived from publicly released Waveshare example code and maintained independently as an engineering-focused hardening effort.
Site Uptime Monitor
External uptime monitoring system with stateful alerting and no commercial dependency.
Built on GitHub Actions as a deliberate architectural choice — runs on infrastructure completely independent of the hosting provider. If the host goes down, the monitor still runs. No commercial service dependency means no pricing changes, no vendor risk, and no single point of failure shared with the monitored system.
Implements stateful alerting with state branch persistence, repeat down notifications, single recovery alert, and dual notification delivery via email and ntfy.
API Exploit Validator
Black-box API vulnerability validation framework focused on reproducible exploit verification.
Framework for validating API vulnerabilities including access control failures,
parameter tampering, and concurrency issues through deterministic request execution
and structured evidence capture.
Designed to model real attack behavior against API surfaces without source access,
emphasizing reproducibility, signal quality, and verification of actual exploit conditions.
Initial module development in progress
Platform Framework
Core platform security and integrity layer protecting high-volume transaction systems.
Detection and integrity framework for protecting high-volume transaction platforms
against fraud, automation abuse, and system integrity compromise, built to operate
under real production constraints and real attacker economics.
Designed to balance technical correctness with practical deployability,
accounting for system complexity, operational cost, and real-world adversary capability.
Design includes software-based behavioral pattern modeling, timing analysis,
request correlation, identity boundary enforcement, and audit-safe evidence generation.
Detection model design complete
Architecture design in progress
In-Product Issue Reporting System
Lightweight, independent issue reporting embedded directly into application error states.
Provides a low-friction mechanism for users to report issues at the moment of failure,
capturing relevant execution context, request metadata, and user-supplied detail without
redirecting to external ticketing systems.
Designed to preserve system state and failure signals, enabling deterministic reproduction,
faster triage, and operationally useful reports during incident response and postmortem analysis.
Design in progress
Document Change Service
Platform service providing authoritative document versioning, audit history, and change traceability for systems that require compliance, accountability, and operational integrity.
Designed around immutable identifiers, complete audit trails, API access, and controlled visibility to support regulatory, security, and operational review.
Design ready