OSA-Midnight Oil Documentation
OSA-Midnight Oil is a local-first desktop workspace built around a master-locked encrypted vault with solid-state aware block storage and cyphers. It combines planning, note-taking, reference capture, identity organization, wallet storage, research tooling, and a cinematic ROS-style shell into one self-contained environment with roll-up and security features.
The project is designed to feel like a personal operations desk rather than a cloud app. Workspace data stays local, can be locked behind a passphrase, and is intended to remain useful offline.
Where to start
If you are a researcher, auditer, tin-foil hat’d person, or even info-sec, or maybe even an engineer or work on trade-secrets, then ROS is designed for you. It is also capabale of handling multiple-identies for Cold-Calling and Sales orgnaization. Just be careful not to develop Multiple Personality Syndrome, notwithstanding it can handle that too.
As of 5/16/2026 we have locked down the public GitHub to aim at a Release Focused approach. Notes will remain as such:
If you have not installed the cockpit yet, go to Installation first. If you are already running it and want to set up your vault, head to First Vault.
What the shell ships with
The cockpit ships with twelve primary modules organized into four doctrines:
- Research — Library, Research Vault, Vault Notes, Method Vault
- Signal — ROS Comms, Nostr Lounge, F*Society LAN, Wallet Vault
- Utility — Calendar, World Clocks, Midnight Console, Inventory
- Primary — Overview, Profile Organizer, Control Room, Flow Studio
Each module loads inside the shell as an embedded surface, not as a floating window.
Local model catalog
The cockpit includes a plain-language model catalog so operators can use local AI without terminal commands or provider setup. The first bundled model profiles are:
- DeepNimSec / Security Model v1 — defensive review for risk summaries, evidence normalization, and safer next steps
- Citizen-AI / Project Blueprint — lab-only defensive training scenarios and verification coaching
ROS presents these as one-click model cards. Developer and AI-builder setup lives behind Advanced setup, but regular users should not need it.
Security posture in one paragraph
Workspace data is encrypted at rest. Decrypted state only lives in memory while the session is unlocked. The shell supports manual lock, idle auto-lock, backup export/import, and explicit nuke/reset. Native desktop builds move trust boundaries into Rust/Tauri instead of browser-managed storage. Local-first is the default — cloud sync is not required for core use.
For the full posture, see Architecture.