LifeOS: Agentic Local Action Model (LAM) LifeOS is an autonomous, local-first AI Operating System built on top of Open Interpreter.
This project serves as a bridge between high-level reasoning and local system execution. Developed using a Vibe Coding methodology, it prioritizes rapid iteration and AI-human collaboration. As a Security Researcher, I have integrated a rigorous audit trail to monitor autonomous actions, ensuring that system-level operations remain transparent and secure.
Project Architecture LifeOS operates as a multi-layered agentic system:
Reasoning Engine: Powered by Google's Gemini 1.5 Flash for low-latency decision making.
Execution Layer: Open Interpreter serves as the primary interface for executing Python, Shell, and JavaScript commands directly on the host machine.
Observability Framework: Dedicated logging modules monitor system health, security alerts, and agent memory state to maintain a high-fidelity record of all autonomous sessions.
Project Structure The current directory layout reflects a separation between core logic, experimental labs, and security auditing:
Plaintext LifeOS/ ├── jarvis.py # Main Orchestrator and Agentic Brain ├── requirements.txt # Project dependency manifest ├── README.md # Documentation and system overview ├── LifeOS_Roadmap.pdf # Strategic vision and milestone tracking ├── modules/ # Core Logic & Functional Packages │ └── init.py # Python package initialization ├── Lab/ # Experimental Development Environment │ └── IndieBeatMaker/ # Algorithmic audio and MIDI generation lab ├── scripts/ # Automation & Utility Scripts │ ├── generate_roadmap.py # Script for generating project milestones │ └── ears_test.py # Audio processing and voice recognition tests ├── logs/ # System, Security, and Session Audit Trail │ ├── found_bugs.log # Records of identified logical vulnerabilities │ ├── P1_Alerts.log # High-priority security and system alerts │ ├── jarvis_memory.log # Long-term state and context storage │ ├── session_2026-01-01.log │ └── session_2026-01-03.log ├── targets.txt # Scoping for active security research └── active_targets.txt # Real-time list of scoped system targets Functional Capabilities
- Security Auditing and Bug Hunting
Leveraging my background in Bug Bounty Research, LifeOS includes a built-in security layer. The system monitors its own execution for logical flaws, logging P1 alerts and identified bugs in found_bugs.log. The targets.txt file defines the operational boundaries, ensuring the agent stays within scoped system parameters.
- Algorithmic Audio Generation
The Lab/IndieBeatMaker module explores multimodal creativity. It uses probability-based algorithms to compose MIDI patterns and melodies, which can be directly imported into Digital Audio Workstations (DAWs) like FL Studio or Ableton.
- Automated Strategy and Roadmapping
The generate_roadmap.py script and its resulting PDF allow the system to self-document its progress. It analyzes current capabilities and outlines future development targets, maintaining a professional development lifecycle.
Installation and Setup Clone the Repository:
Bash git clone https://github.com/ajeetmaurya395/LifeOS.git cd LifeOS Initialize Virtual Environment:
Bash python3 -m venv venv source venv/bin/activate Install Requirements:
Bash pip install -r requirements.txt Security Configuration: Ensure your targets.txt is configured before running jarvis.py to define safe operational zones.
Developed by Ajeet Maurya | Information Technology, IIIT Lucknow