May 23, 2026 · SkyeVault · Cloudflare · 0S production · founder day log

Today I fought the repo-loss demon and pushed the full 0S into the secured vault again.

This was one of those dev days where the product, the proof, the pain, and the pitch all became the same thing. I was not writing a theoretical backup feature. I was using my own 0S repo as the stress test, the recovery proof, the marketing story, and the architecture checkpoint.

ShYT may crash, but Skye keeps the sKache. No perfect-tech promises. Just receipts, recovery prompts, encrypted custody, and proof that the last clean move does not have to disappear.

The day started with a simple fear: I never want to lose my repo again.

That sounds dramatic until you have actually lived inside a massive codebase across Codespaces, VS Code, local terminals, Worker deploys, generated proof files, untracked scratch scripts, root env notes, and app folders that are too sensitive or too unfinished to shove into a public Git remote.

Git is good. GitHub is useful. But Git does not automatically care about the untracked file you forgot to add. GitHub does not want your secret-bearing operator files. Public source control is not the same thing as source custody. Today was about making that difference real inside SkyeVault.

The first struggle was language.

I kept saying I wanted the vault to have everything, secrets and all, because the vault is protected by passphrase and encryption. That does not mean I want secrets on GitHub. It means I want the owner recovery lane to hold the repo the way the workspace actually exists, wrapped before storage, not sanitized into a public sharing shape.

That became the whole architecture split: public Git hygiene stays clean, client handoff lanes stay sanitized, and the owner source-custody lane is allowed to carry tracked files, untracked files, local-only material, and secret-like operator files inside an encrypted artifact.

Then we had to get honest about the daemon.

A daemon is not a magic cloud promise. It is a background process. If VS Code closes but the workspace is still alive, it can keep running. If the whole machine, Codespace, or container dies before the next completed upload, the daemon cannot read a filesystem that is gone. That is not a weak infrastructure problem. That is the boundary of reality.

So the product claim became sharper: the autosync lane reduces the loss window and proves the latest completed recovery point. Roughly every ten minutes, it checks the repo, detects whether the current digest matches the last successful encrypted artifact, and pushes only when the repo/vault parity changed.

The part that took time is exactly the part that matters.

The Pages deploy was quick because it only had to upload changed web assets. The 0S Worker deploy was slower because the 0S asset tree is enormous. But the SkyeVault source-custody push was the heavy lift because it was not uploading a page. It was packaging, encrypting, streaming, finalizing, and receipt-writing the full repo state.

That is why a tar/zstd encrypted artifact can feel less "clickable" than a zip but still be the right tool for a serious repo. Zip is familiar. Tar/zstd is strong for streaming and large source custody. The user-facing goal is still easy recovery, but the data plane needs to be built for a massive repo, not nostalgia.

Today’s production flow was real.

We wrote and deployed the founder longform page explaining SkyeVault autosync, daemon behavior, VS Code/workspace boundaries, encrypted source custody, revision rounds, and the no-guarantee line. Then we put that page into the 0S marketing surfaces and Founder Drops hub with a direct link and screenshot asset.

We added emoji style guidance to the 0S brains too. Not childish. Not sprayed over serious surfaces. Just enough glyph language so the 0S feels alive in help text, proof labels, and routing cards while legal, auth, payment, code, and security language stays sober.

Then we pushed production. MetrAIyux 0S went live again on Cloudflare Workers. The marketing site went live again on Cloudflare Pages. The public blog page smoke-checked. The Founder Drops promo smoke-checked. The screenshot asset smoke-checked. The 0S proof endpoint correctly stayed owner-gated behind FS27.

Receipts from the day
  • SkyeVault encrypted full-repo receipt: cdv_8a81acb05f6eb0e88e4b4ee7
  • SkyeVault control pack receipt: cdv_65abd2a543df96bedbc55462
  • Artifact bytes: 1,384,905,312
  • Artifact SHA-256: 2e0212ad572cbb5fce22496ebf048a2f358199ad3c97e5d4f8f73f688a410144
  • 0S Worker version deployed during the pass: bfa7c890-28b0-4fdf-be10-50f5c92237ef
  • Marketing Pages preview after the proof-link correction: https://a1737a2a.metraiyux-0s-marketing.pages.dev
  • Formal headed browser proof was skipped because I chose to live-check it myself; HTTP smoke checks passed for the public pages/assets and owner-gated proof behavior.

The real win is bigger than a backup.

What happened today is that SkyeVault got closer to being the dev custody layer I actually need. Not a "remember to commit" reminder. Not a GitHub clone. A sovereign recovery lane where a dev can move between workspaces, protect local-only work, keep secrets out of public remotes, and still have a serious encrypted path back.

That is also why DevoodeRator exists now. Every day like this has a story inside it: the bug, the architecture gap, the workflow stress, the tool decision, the proof, the deployment, the receipt. I want that written while the heat is still on it, not six months later in a sterile changelog.

Next: SkyeVault Bins.

The next idea is specific vault folders. I am calling them Bins. SkyeAgents Bin. DevoodeRator Bin. Client Portal Build Bin. SupaBoy Build Bin. The point is that not every important folder should be forced into a Git-shaped workflow before it is protected. Some folders need encrypted custody first, Git later, deploy when ready.

That is a beta lane right now because import/export/deploy straight from the vault is serious infrastructure. But the direction is clear: keep workspaces cleaner, let agents operate from scoped bins, protect files without leaking values, and make the vault a source of deployable recovery, not just cold storage.

Today was another successful full 0S push to the secured vault. That is not a small win. That is the company proving its own doctrine on its own codebase.