AI-native automation tooling for high-leverage operators.
Plugin family for Claude Code, system daemons for macOS / Linux, and infra recipes that compose. Apache-2.0 + MIT throughout. SLSA L2 + Sigstore + reproducible builds.
| Plugin | Stack | Purpose |
|---|---|---|
| wa | Go · whatsmeow · SQLite · JSON-RPC | WhatsApp daemon with append-only safety, allowlist + rate limiter + warmup ramp. Built so an LLM can use it without becoming a vector for spam or impersonation. |
| claude-mac-chrome | Bash · AppleScript · TypeScript | Multi-profile Chrome control on macOS. Reads Chrome's Local State catalog + drives React/Ember SPAs via cliclick at computed screen coords. Zero user configuration. |
| linkedin-chrome-copilot | TypeScript · Anthropic SDK | LinkedIn copilot — five user-stories (resume, draft-reply, book-slot, CV tailor, guardrails). Per-channel tone + transport + validation. PII-scanner CI gate. |
| kokoro-speakd | Python · ONNX | Persistent Kokoro TTS daemon. Loads model once, serves over unix socket. Sub-200ms warm-call latency. PyPI-published with PEP 740 attestations. |
| claude-classroom-submit | Python · Google Classroom API | Bypasses Drive Picker iframe via REST API + OAuth 2.0. End-to-end submission < 5s. |
| fand | Rust · launchd | Apple Silicon thermal daemon. Temperature-driven curves, SIGHUP reload, exact-pin reproducible builds. |
Plugins compose. linkedin-chrome-copilot uses claude-mac-chrome for browser routing. Both sit alongside wa for cross-channel pipelines. kokoro-speakd narrates agent status without per-call model-load latency. fand keeps the laptop cool while all of the above run in parallel.
The agent loop becomes a graph of specialized capabilities, not a monolithic chat assistant.
Every release ships with:
- SLSA L2 build provenance via
actions/attest-build-provenance@v2(GitHub native attestations) - Cosign keyless signature via Sigstore + GitHub OIDC (no PEM management)
- Dual SBOM — CycloneDX 1.7 + SPDX 2.3 (
syft) - Reproducible builds —
SOURCE_DATE_EPOCH,-trimpath,-buildvcs=true - Verification one-liner:
gh attestation verify <artifact> --owner yolo-labz
CI hardened: every action SHA-pinned (40-char) with version comment, permissions: {} deny-all + per-job re-grant, step-security/harden-runner egress audit, zizmor + actionlint pre-commit.
brew install yolo-labz/tap/<plugin> for CLI tools. Pre-notarized macOS binaries built from a Linux runner via rcodesign.
brew tap yolo-labz/tap
brew install yolo-labz/tap/waEach repo carries a constitution.md (under .specify/memory/) with binding rules: hexagonal core, daemon owns state, no --force ever, CGO_ENABLED=0 where applicable, conventional commits, signed tags. Spec-driven development with citations — every "best practice" claim links to a primary source.
Pedro Balbino · Senior SWE specializing in AI-native automation. Engineering writeups + plugin demos at blog.home301server.com.br · portfolio at portfolio.home301server.com.br · LinkedIn balbinopedro.