Skip to content
View gammahazard's full-sized avatar

Block or report gammahazard

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
gammahazard/README.md

CM Mongo

Role Focus Stack

Systems Engineer | Edge Computing & Distributed Systems

I build secure, distributed systems from bare metal to cloud edge. My focus: WASM sandboxing (WASI, Workers), industrial IoT, and fault-tolerant architectures. Currently exploring capability-based security for edge computing.

🖥️ Launch Interactive Terminal Portfolio →
Built with Rust & WebAssembly


🎯 Featured Projects

Guardian One — The Flagship Demo

Guardian One Web Demo | Live Demo →

Story-driven demonstration of industrial edge security—Python/Docker vs WASM side-by-side.

  • Concept: Industrial edge security with IEC 62443 zones, 2oo3 TMR voting, live attack simulations
  • Stack: Leptos, Pyodide (real Python execution), WASI 0.2
  • Features: Real CVE citations, guided learning flow (Problem → Hardware → Demo → Proof)
  • Hardware Preview: Browser simulation of upcoming physical demo with Siemens S7-1200 PLC + 3-node Raspberry Pi Raft cluster

Edge Protocol Demo — Production Cloudflare Workers

Edge Protocol Demo | Live Demo →

Production-style Cloudflare Workers + Leptos dashboard demonstrating real-world edge patterns.

  • Features: URL shortener (Workers KV), edge rate limiter (10M+ req/day capable), capability sandbox
  • Stack: Rust → WASM (Workers), Leptos 0.7 (Pages), CI/CD via GitHub Actions
  • Architecture: Shows same capability security principles as WASI, but at cloud edge
  • Highlight: Complete production setup—rate limiting, CORS, health checks, standard headers

Edge WASI Runtime — Hardware Proof

Edge WASI Runtime | Live on Raspberry Pi

Secure, hot-swappable IoT runtime executing sandboxed Python plugins on Raspberry Pi.

  • Concept: Running untrusted Python scripts on bare metal without risk
  • Stack: Rust (host), WASI Component Model, Python (guest), Wasmtime, Tokio
  • Innovation: Hybrid architecture—Rust for safety, Python for velocity
  • Highlight: Hot-swap a running sensor driver in <10ms without dropping connections (demonstrated live on hardware)

Raft Consensus Cluster — Distributed Systems

Raft Consensus | Live Demo →

Distributed consensus in the browser—same Rust binary runs in browser AND on Raspberry Pi.

  • Concept: Leader election, log replication, network partitions—all visualized live
  • Stack: Rust, WASI 0.2, Leptos, IndexedDB, BroadcastChannel
  • Advanced: PreVote protocol (Raft Thesis §9.6) prevents disruptive servers
  • Highlight: 120+ tests, chaos controls to kill nodes and watch self-healing

🔧 More Projects


🛠️ Tech Stack

Core Systems Web & Edge Security & Data
Rust, WASI 0.2, Wasmtime Next.js 14, React, TypeScript FIDO2, IEC 62443, Zero Trust
Leptos, Component Model Cloudflare Workers/Pages Capability Security, 2oo3 TMR
nom Parser, Axum Node.js, Tokio PostgreSQL, MongoDB, KV

🧠 Engineering Philosophy

Deep Runtime Knowledge: I understand WASM runtimes (Wasmtime, browser), JavaScript internals (Event Loop, ESM/CJS), and hardware constraints (Raspberry Pi, PLCs).

Capability-Based Security: Deny-by-default sandboxing. Untrusted code gets only explicitly granted permissions—whether WASI plugins or Cloudflare Workers.

Crash Containment: Malformed parsers run in WASM sandboxes. Buffer overflow kills the sandbox, not the host. Sub-millisecond recovery, zero data loss.

Hybrid Architecture: WASM + Docker coexist—Docker ships infrastructure (Rust host), WASM ships business logic (plugins). O(n) tenants in O(1) container.

Evidence Over Assertions: When I claim "<0.1ms rebuild," I provide performance.now() timings (5-sample averaged) in live demos.


📫 Connect


Engineering high-assurance systems—from industrial edge devices to enterprise web. 🚀

Pinned Loading

  1. edge-wasi-runtime edge-wasi-runtime Public

    A secure, hot-swappable IoT runtime executing sandboxed Python plugins on Raspberry Pi using Rust and the WASI Component Model.

    Rust

  2. edge-protocol-demo edge-protocol-demo Public

    Edge computing demo with Rust + WASM. Features URL shortener, rate limiter, and capability-based security—all running on Cloudflare Workers. Interactive Leptos dashboard with live stats. Demonstrat…

    Rust

  3. Guardian-one-web-demo Guardian-one-web-demo Public

    Interactive browser demo comparing WASM vs Python for industrial edge security. Real Pyodide execution, 2oo3 TMR voting, sub-ms WASM failover. Built with Leptos/Rust

    Rust

  4. protocol-gateway-sandbox protocol-gateway-sandbox Public

    Safe legacy protocol translation via WASM sandboxing — Modbus TCP → MQTT with crash containment

    JavaScript 1

  5. Raft-Consensus Raft-Consensus Public

    Distributed consensus demo via WASI 0.2 — same Raft binary runs in browser and on Raspberry Pi cluster

    Rust

  6. Vanguard-kennel-frontend Vanguard-kennel-frontend Public

    Flagship PWA for high-reliability facility management. Features FIDO2 biometric authentication, real-time operational telemetry, and rigid role-based command portals.

    TypeScript