Credits
ostk stands on decades of open-source work. Every subsystem builds on crates and tools that others published, maintained, and shared.
The licenses that make this possible are listed in each crate's repository. If you find ostk useful, consider sponsoring the projects below — they do the hard work.
CORE_RUNTIME
The async runtime, HTTP client, and CLI foundations that every subsystem builds on.
tokio reqwest clap serde tracing TERMINAL_UI
The stack that powers the ostk TUI — real-time fleet monitoring, tack bar, permission gates.
ratatui ratatui-textarea crossterm vte unicode-width SANDBOX_ISOLATION
Syscall-level sandboxing for agents. Enabled via the ISOLATION nono directive in Agentfile.
CRYPTOGRAPHY_IDENTITY
The trust chain — Ed25519 signing, SHA-2 hashing, Sigstore attestation, secure memory zeroing.
ed25519-dalek sha2 sigstore zeroize rand_core EMBEDDINGS_ML
Semantic deduplication in the squash pipeline. Opt-in via the embeddings feature flag.
MODEL_RUNTIME
External runtimes ostk drives via the DRIVER directive.
FILESYSTEM_PARSING
File watching, locking, and format parsing across the kernel.
notify fs2 nix libc pulldown-cmark regex ERROR_HANDLING
Structured error types and pretty reporting.
Thanks
ostk also owes a debt to the broader Rust ecosystem — the Rust compiler team, crates.io maintainers, and everyone who files issues and answers them. And to Apple's Foundation Models team for making on-device inference practical via olleh.
The Archive Industrial design system draws inspiration from technical documentation traditions — man pages, kernel source comments, and the aesthetic of well-maintained archives.