John Zachary Fitch
Agent tooling | systems performance | privacy-first infrastructure
I build production-grade tooling for agents and the substrate they depend on: deterministic retrieval, verifiable edits, structured tool APIs, and execution environments you can reason about. I work across Rust, Python, and web platforms with an evidence-first style: measure, reproduce, fix, and ship.
Recent Highlight (Jan 2026)
Ghost in the Codex Machine
Investigated and helped fix an "invisible" release-only regression where a pre-main constructor stripped LD_* / DYLD_* environment variables, breaking CUDA/MKL library discovery inside tool subprocesses. Shipped upstream with release-notes credit.
Representative impact
- MKL/BLAS (repro harness): ~2.71s -> ~0.239s (11.3x)
- CUDA workflows: restored expected library discovery to avoid CPU fallback in affected setups
Release notes excerpt:
"Special thanks to @johnzfitch for the detailed investigation and write-up in #8945."
How I Work
- Construct from first principles rather than refine existing forms.
- Recover overlooked work — revisit ideas and approaches that didn't take the first time, with current tools.
- Probe working systems for hidden assumptions; rebuild the parts that don't hold up.
- Operate well in complex, debated, high-ambiguity spaces.
- Find a useful subspace inside a team early; manage well under crisis and time pressure.
Core Skills
Rust
Performance-critical systems, CLI tools, data structures, correctness-oriented engineering
Python
Tooling, analysis pipelines, automation, reproducible experiments
Web
WebGPU/WASM applications, client-side ML inference, offline-first UX
Systems
Linux, NixOS, DNS, TLS automation, containerized services, security hardening
Agent Integration
MCP servers, skill/plugin packaging, tool-driven workflows
Selected Projects (Public)
- llmx (Rust core, JS/WASM web; live: llm.cat) - local-only codebase indexer built on Burn-ml and mdbr-leaf-ir; hybrid search (BM25 + neural embeddings) fused via RRF; deterministic chunking with content hashing
- claude-warden (Shell/OTEL, ★57) - security hooks and budget system for Claude Code, with a built-in web viewer for extensive OTEL traces
- claude-cowork-linux (Linux, ★236) - native Linux port of Claude Desktop, security-first: treat the host OS as the VM (no Mac VM layer), wrap in bubblewrap, and handle the ASAR from outside the sandbox rather than hooking in; strips dispatch/channels, preserves Cowork/Code/Chat
- dota (Rust) - post-quantum secrets manager: hybrid ML-KEM-768 + X25519, Argon2id KDF, SQLCipher at rest, YubiKey/SoloKey HMAC-SHA1 hardware auth
- pyghidra-lite (Python/MCP, ★32) - token-efficient MCP server for Ghidra (official MCP registry:
io.github.johnzfitch/pyghidra-lite, v0.1.1) - codex-xtreme (Rust) - optimized, patched Codex builds (includes codex-patcher)
- burn-plugin - Claude Code plugin + skills for the Burn deep learning framework
- Observatory (WebGPU) - client-side AI image detection (live)
- SpecHO v2 (Python) - 161D linguistic fingerprinting for AI text detection
- definitelynot.ai (PHP/JS) - Unicode-security-aware sanitizer + API
- Iconics (Python) - semantic icon library for professional docs (8k+ icons)
Operating Background
Owner-operator of a regulated chemical-manufacturing business for 10 years; FDA and CPSC oversight, hazardous-substance handling. Sustained a multi-year PMTA process under non-committal regulatory guidance, including FOIA-driven information gathering. Mission: help adults worldwide quit smoking cigarettes. Declined paths that diverged from that mission even when commercially favorable; wound down on deliberate terms in the company's strongest revenue year.
What this established:
- Tolerance for prolonged regulatory ambiguity without losing direction.
- Operating discipline at production scale: manufacturing, compliance, hiring, crisis response.
- Over a decade under public scrutiny — grounded in the work, confident defending it on the record, practiced at navigating it responsibly.
Infrastructure (Self-Hosted)
I operate production infrastructure on bare metal with:
- Declarative NixOS configuration (reproducible, atomic upgrades, rollbacks)
- Authoritative DNS and automated wildcard certificates (DNS-01 / RFC2136)
- Post-quantum security layers (hybrid SSH KEX, WireGuard + Rosenpass)
Education
UC Berkeley - Mathematics. Withdrew during the 2020 lockdowns under a granted automatic readmission.
What I'm Looking For
Roles building agent runtimes and developer tools, retrieval systems, and security/privacy foundations. I work best on teams that value measurable results, clear ownership, and high engineering standards.