Enterprise-Grade Privacy and Security
Enterprise-Grade Privacy, Security & AI
A collection of 28 auto-documented Rust binaries plus bundled companion runtimes that form the backbone of Linux Kodachi's privacy, anonymity, and intelligence infrastructure. Security/control binaries deliver enterprise-level protection and policy enforcement, while KAICS AI binaries plus ai-gateway provide a 6-tier AI engine (TF-IDF → ONNX → Mistral.rs → GenAI/Ollama → Legacy LLM → Claude CLI), trusted agent orchestration, and machine-safe command execution — all processed locally with optional cloud AI tiers routable through VPN or Tor.
Core Architecture Principles
Zero-Trust Architecture: Authentication-first design with granular authorization and certificate pinning
Memory-Safe Implementation: Rust-first design with comprehensive error handling and rigorous safety practices
Modular Design: Independent services with shared libraries through cli-core, auth-shared, and logs-hook
Forensic Resistance: Multi-pass secure wiping, memory cleaning, emergency data destruction capabilities
Privacy-First AI: 6-tier AI engine runs locally by default — optional cloud tiers can be routed through VPN or Tor based on your preference
Looking for a Complete Solution?
These are individual security components designed for advanced users who want to integrate specific tools into their workflow.
For a full desktop experience with GUI, Conky system monitor, LibreWolf browser, and 10 dynamic application layers — choose the Kodachi Desktop Edition, our latest release built on Debian 13 (Trixie).
For a headless, command-line-only environment optimized for testing, SOCKS proxy deployment, and server operations — choose the Kodachi Terminal Server.
Both editions provide:
- All binaries pre-installed and configured
- Seamless integration between components
- Complete privacy stack out-of-the-box
- KAICS AI engine +
kodachi-clawandzeroclawagent runtimes
Kodachi is built and maintained by one person since 2013. These 28 binaries and hundreds of commands are provided free. Your support keeps them maintained. Support the project
Documentation Hub
Quick Start
Installation guide and getting started with Kodachi binaries
User Guides
Comprehensive guides for Network, Security, Protection, and Infrastructure tools
CLI Reference
Complete command-line reference for all 27 core security and AI binaries
New: Kodachi Dashboard Now Included in Binary Packages
The Kodachi Dashboard is now bundled with the binary packages! This modern Tauri + Svelte desktop application provides a unified GUI interface for all Kodachi security services. Features include:
- Centralized Control Panel - Manage all binaries from one elegant interface
- Authentication Management - online-auth service integration with visual status monitoring
- Network Routing - routing-switch protocol control (VPN, WireGuard, Shadowsocks, etc.)
- Tor Network Management - tor-switch operations with 107 commands accessible via GUI
- DNS Configuration - dns-switch management and leak detection
- System Health Monitoring - health-control and integrity-check operations
Install the binaries to access the dashboard and streamline your security workflow. Feedback welcome on Discord!
Binary Categories and Requirements
Network and Privacy Tools
| Binary | Primary Function | Auth | Sudo | Auto-Start |
|---|---|---|---|---|
| tor-switch | Advanced Tor network orchestration (107 commands) | Mixed 67% | Required | No |
| routing-switch | Multi-protocol routing (12 protocols) | Mixed 61% | Required | No |
| ip-fetch | Secure IP geolocation with multi-source verification | No 0% | No | No |
| dns-switch | DNS management with 50+ secure resolver options | Mixed 25% | Mixed | No |
| dns-leak | Real-time DNS leak detection and analysis | Mixed 25% | No | No |
System Security and Protection
| Binary | Primary Function | Auth | Sudo | Auto-Start |
|---|---|---|---|---|
| health-control | Emergency kill switches and panic modes | Mixed 84% | Required | No |
| integrity-check | Cryptographic system integrity verification | No | No | No |
| permission-guard | Real-time permission monitoring and enforcement | Mixed 75% | Required | No |
| online-auth | Secure authentication and heartbeat monitoring | Mixed 70% | Required | No |
Infrastructure and Management
| Binary | Primary Function | Auth | Sudo | Auto-Start |
|---|---|---|---|---|
| logs-hook | Centralized secure logging infrastructure | Yes 100% | Required | Auto |
| deps-checker | Dependency validation and security auditing | No | No | No |
| global-launcher | System-wide binary deployment manager | No | No | No |
| workflow-manager | Batch command execution with conditional logic | Mixed 11% | Required | No |
| online-info-switch | Online information hub and RSS feeds | Mixed 58% | No | No |
| conky-status | Unified Rust telemetry gateway for Conky desktop panels | No | No | Auto |
GUI Applications and Desktop Interface
| Application | Primary Function | Technology Stack | Auth | Sudo |
|---|---|---|---|---|
| kodachi-dashboard | Unified GUI control center for all security services | Tauri 2 + Svelte 5 | Mixed | Required |
AI & Intelligence
| Binary | Primary Function | Type | Sudo | Auto-Start |
|---|---|---|---|---|
| ai-cmd | Natural language CLI for Kodachi commands | On-demand | No | No |
| ai-trainer | ML model training and validation | On-demand | Required | No |
| ai-learner | Learning orchestration and analysis | On-demand | No | No |
| ai-admin | Database management and diagnostics | On-demand | No | No |
| ai-discovery | Binary watcher and auto-indexer daemon | Daemon | Required | Optional |
| ai-scheduler | Cron-based task scheduler | Daemon | Required | Optional |
| ai-monitor | Proactive system monitoring daemon | Daemon | Required | Optional |
| ai-gateway | Unified agent command gateway, policy firewall, and safe executor | On-demand | Policy | No |
| kodachi-claw | Anonymous autonomous AI agent runtime with embedded Tor | On-demand / Daemon | Required | No |
Binary Descriptions and Use Cases
Comprehensive overview of each security binary's functionality, primary use cases, and operational capabilities. These user-friendly descriptions provide context for the technical specifications detailed in subsequent sections.
Navigation Guide
Each binary description includes primary function, key capabilities, typical use cases, and integration notes. For detailed command references and authentication requirements, see the individual binary documentation linked in each description.
kodachi-dashboard - Unified GUI Control Center
Quick Reference: Desktop Application | Technology: Tauri 2 + Svelte 5 | Auth Level: Mixed (varies by feature) | Sudo Required: Yes (backend operations)
Key Features:
- Centralized Authentication: Visual monitoring and management of online-auth service status and API key validation
- Network Protocol Control: Easy switching between VPN, WireGuard, Shadowsocks, V2Ray, Xray, Hysteria2, and Tor routing
- Tor Management: GUI access to 107 tor-switch commands including circuit rotation, exit node selection, and load balancing
- DNS Configuration: Visual DNS server selection, DNSCrypt management, and real-time leak detection
- System Health Dashboard: Emergency kill switches, panic modes, integrity verification, and security scoring
- Modern Tech Stack: Leverages Rust backend for security, Tauri for native performance, and Svelte 5 for reactive UI
Use Cases:
- Quick access to all security features without memorizing CLI commands
- Visual monitoring of system security status and active connections
- Rapid protocol switching for different anonymity requirements
- Dashboard-style overview of all Kodachi services in one window
- Ideal for users transitioning from GUI-based privacy tools
ai-cmd - AI-Powered Command Interface
Quick Reference: Full Documentation | Type: On-demand | Sudo Required: No
ai-gateway - Unified Agent Command Gateway
Quick Reference: Full Documentation | Type: On-demand | Sudo Required: No (policy dependent)
Validated integration points (2026-02-19):
search --jsonexposesinvocation(service,command) for deterministic agent callsrun --args-jsonaccepts object payloads for shell-quote-safe invocation- dangerous commands require explicit confirmation for live execution
- dangerous
--dry-runremains available for planning - supported agent IDs include:
kodachi-claw,zeroclaw,nullclaw,openclaw,picoclaw,nanoclaw,claude-code,gpt,gemini,open-interpreter,anonymous
ai-trainer - ML Model Training and Validation
Quick Reference: Full Documentation | Type: On-demand | Sudo Required: Yes (model ops)
ai-learner - Learning Orchestration and Analysis
Quick Reference: Full Documentation | Type: On-demand | Sudo Required: No
ai-admin - Database Management and Diagnostics
Quick Reference: Full Documentation | Type: On-demand | Sudo Required: No
ai-discovery - Binary Watcher and Auto-Indexer
Quick Reference: Full Documentation | Type: Daemon | Sudo Required: Yes
ai-scheduler - Cron-Based Task Scheduler
Quick Reference: Full Documentation | Type: Daemon | Sudo Required: Yes
ai-monitor - Proactive System Monitoring Daemon
Quick Reference: Full Documentation | Type: Daemon | Sudo Required: Yes
kodachi-claw - Anonymous Autonomous AI Agent Runtime
Quick Reference: Full Documentation | Type: On-demand / Daemon | Sudo Required: Yes (Tor + identity)
kodachi-claw (anonymity-hardened runtime) and zeroclaw (upstream-compatible runtime) as separate binaries.
Key Features:
- Embedded Tor: Arti Tor stack built into the binary with multi-circuit pool (default 10 instances)
- Identity Randomization: MAC address, hostname, and timezone randomization on startup
- Verification: IP and DNS leak checks confirm traffic exits through Tor
- OPSEC Filter: Redacts outbound identity leaks from agent messages
- Namespace Isolation: Full network namespace via oniux (
--mode isolated) - 28+ AI Providers: OpenAI, Anthropic, Gemini, Ollama, OpenRouter, and more — all through Tor
- 15+ Channels: Telegram, Discord, Slack, Matrix, WhatsApp, Signal, Email
- Hardware Peripherals: STM32, RPi GPIO, USB device control
- Sandboxing: Landlock, Bubblewrap, Firejail, Docker backends
Bundled Companion Binaries (shipped with package builds):
| Binary | Scope | Provenance | References |
|---|---|---|---|
| zeroclaw | Upstream-compatible lightweight agent runtime | Upstream runtime bundled by Kodachi | Installation · Terminal Server |
| oniux | Namespace-based process isolation helper | Third-party open source (Tor Project) bundled by Kodachi | Protection Index |
| tun2socks-linux-amd64 | TUN/TAP to SOCKS5 routing bridge for proxy protocols | Third-party open source bundled by Kodachi | Protection Index · Installation |
Use Cases:
- Untraceable AI agent for sensitive operations
- Anonymous automation through Tor-routed channels
- Privacy-first AI assistant with identity protection
online-auth - Authentication and Heartbeat Monitoring
Quick Reference: Full Documentation | Auth Level: 57% | Sudo Required: Yes (system-wide)
routing-switch - Multi-Protocol Network Routing
Quick Reference: Full Documentation | Auth Level: 61% | Sudo Required: Yes (network config)
tor-switch - Advanced Tor Network Orchestration
Quick Reference: Full Documentation | Auth Level: 73% | Sudo Required: Yes (iptables/nftables)
ip-fetch - Secure IP Geolocation
Quick Reference: Full Documentation | Auth Level: 0% | Sudo Required: No
online-info-switch - Information Hub and RSS Feeds
Quick Reference: Full Documentation | Auth Level: 58% | Sudo Required: No
conky-status - Unified Conky Telemetry Gateway
Quick Reference: Full Documentation | Conky Desktop Section | Auth Level: 0% | Sudo Required: No
health-control - Emergency Kill Switches and Panic Modes
Quick Reference: Full Documentation | Auth Level: 83% | Sudo Required: Yes (system ops)
dns-switch - DNS Management with 50+ Resolvers
Quick Reference: Full Documentation | Auth Level: 25% | Sudo Required: Mixed (write operations)
dns-leak - DNS Leak Detection and Prevention
Quick Reference: Full Documentation | Auth Level: 25% | Sudo Required: No
integrity-check - Cryptographic System Verification
Quick Reference: Full Documentation | Auth Level: 0% | Sudo Required: No
permission-guard - Real-Time Permission Monitoring
Quick Reference: Full Documentation | Auth Level: 75% | Sudo Required: Yes (3/4 commands)
logs-hook - Centralized Logging Infrastructure
Quick Reference: Full Documentation | Auth Level: 100% | Sudo Required: Yes (all commands)
deps-checker - Dependency Validation and Auditing
Quick Reference: Full Documentation | Auth Level: 0% | Sudo Required: No
global-launcher - System-Wide Binary Deployment
Quick Reference: Full Documentation | Auth Level: 0% | Sudo Required: No
workflow-manager - Batch Command Execution and Automation
Quick Reference: Full Documentation | Auth Level: 11% | Sudo Required: Yes (system ops)
Inter-Binary Dependencies Matrix
Binary Communication Flow
| Service | Calls These Binaries | Called By These Binaries |
|---|---|---|
| online-auth | logs-hook | Authentication required by: ip-fetch, tor-switch, routing-switch, dns-switch, dns-leak, health-control, online-info-switch |
| logs-hook | None | Integrated by all services for centralized logging |
| ip-fetch | logs-hook, online-auth, routing-switch | tor-switch, routing-switch, dns-switch, dns-leak |
| tor-switch | logs-hook, online-auth, ip-fetch | routing-switch |
| routing-switch | logs-hook, online-auth, tor-switch, ip-fetch | health-control, ip-fetch |
| dns-switch | logs-hook, online-auth, ip-fetch | None |
| dns-leak | logs-hook, online-auth, ip-fetch | None |
| health-control | logs-hook, online-auth, routing-switch | dns-switch, online-info-switch |
| integrity-check | logs-hook | None |
| permission-guard | logs-hook | Can be used alongside online-auth for permission checks |
| deps-checker | logs-hook | None |
| global-launcher | logs-hook | Can be orchestrated by online-auth for deployments |
| workflow-manager | logs-hook | None (user-initiated batch operations) |
| online-info-switch | logs-hook, online-auth, health-control | None |
| conky-status | logs-hook, online-auth, ip-fetch, dns-switch, health-control | None (consumed by Conky desktop panels) |
| ai-gateway | logs-hook | kodachi-claw, external agents |
| kodachi-claw | online-auth, ip-fetch, tor-switch, oniux (in-process); optionally ai-gateway | None (user-facing) |
Critical Service Dependencies
| Dependency Type | Description | Affected Services |
|---|---|---|
| Authentication Chain | Services requiring valid authentication before operation | ip-fetch, tor-switch, routing-switch, dns-switch, dns-leak, health-control, online-info-switch |
| Logging Infrastructure | All services use logs-hook for centralized logging | ALL binaries |
| IP Verification | Services that call ip-fetch for network testing | tor-switch, routing-switch, dns-switch, dns-leak |
| System Management | Services that may interact with online-auth | permission-guard, global-launcher |
Command Surface Matrix
Current Command Totals (Generated from bin-json/*_rust_binary.json)
| Service | Total Commands | Privilege Model | Primary Use Case |
|---|---|---|---|
| health-control | 213 | Mixed (many system operations require sudo) | Emergency kill switches, panic modes, system hardening |
| tor-switch | 107 | Mixed (network stack and firewall operations may require sudo) | Tor orchestration and circuit controls |
| dns-switch | 27 | Mixed (runtime checks + privileged DNS/system updates) | DNS management and resolver control |
| online-auth | 20 | Service-auth + local execution | Authentication service and heartbeat/session management |
| kodachi-claw | 20 | Mixed (Tor/bootstrap steps often require elevated access) | Anonymous AI agent runtime |
| routing-switch | 18 | Mixed (routing and protocol transitions may require sudo) | Multi-protocol network routing |
| ai-cmd | 13 | Mostly user-level; delegated commands vary | Natural language command interface |
| workflow-manager | 12 | Workflow-dependent | Batch command execution and automation |
| ip-fetch | 11 | Mostly user-level | IP geolocation and network verification |
| ai-gateway | 9 | Policy-dependent | Agent command gateway and policy firewall |
| ai-trainer | 8 | Mostly user-level | ML model training and validation |
| integrity-check | 7 | Mixed (read-only checks vs protected paths) | System integrity verification |
| online-info-switch | 10 | Mostly user-level | Information feeds and freshness checks |
| deps-checker | 6 | Mostly user-level; install actions may require sudo | Dependency validation |
| dns-leak | 4 | Mixed | DNS leak testing |
| permission-guard | 4 | Mixed (fix operations require sudo) | Permission monitoring and remediation |
| ai-learner | 4 | Mostly user-level | Learning orchestration and analysis |
| ai-monitor | 4 | Mostly user-level | Proactive monitoring daemon |
| ai-scheduler | 4 | Mixed (scheduled command privilege follows command) | Cron-based task scheduling |
| ai-admin | 3 | Mostly user-level | AI database diagnostics and maintenance |
| ai-discovery | 3 | Mostly user-level | Binary discovery/indexing daemon |
| global-launcher | 3 | Mixed (deploy operations may require sudo) | Binary deployment and verification |
| logs-hook | 3 | Mixed (log maintenance can require elevated access) | Logging and log maintenance |
| conky-status | 4 | Mostly user-level | Conky details (legacy conky-details) telemetry gateway |
Source of Truth
These totals come from each binary's generated flag_h.commandCategories metadata in docs/binaries/bin-json/.
Privilege/auth requirements are command-specific; check each binary page for exact per-command behavior.
Command Coverage Dashboard
Visualization Scope
This dashboard is a legacy visual layer. Use the Command Surface Matrix above and per-binary pages for exact current command and privilege details.
Key Insights
Overview Statistics
Largest Command Surfaces
Low Command Surface
Bundled Companion Runtimes
Command Distribution
Binary Authentication Overview
Authentication Patterns by Service Type
| Pattern | Services | Description |
|---|---|---|
| No Authentication | logs-hook global-launcher deps-checker permission-guard integrity-check ai-cmd ai-trainer ai-learner ai-admin ai-discovery ai-scheduler ai-monitor ai-gateway | No auth-shared library usage |
| Mixed Authentication | online-info-switch dns-leak routing-switch ip-fetch dns-switch tor-switch health-control workflow-manager kodachi-claw | Selective command authentication |
| Bulk Operations Auth | ip-fetch | Only bulk/multi operations require auth |
| Emergency Bypass | health-control | Critical recovery commands bypass auth |
| Special Provider | online-auth | Authentication provider service |
Service-Specific Authentication Details
logs-hook
Total Commands: 3 | Auth Required: 3 | No Auth: 0
Command Reference
global-launcher
Total Commands: 3 | Auth Required: 0 | No Auth: 3
Commands Without Authentication (3)
deps-checker
Total Commands: 6 | Auth Required: 0 | No Auth: 6
Command Reference
permission-guard
Total Commands: 4 | Auth Required: 3 | No Auth: 1
Commands Requiring Sudo (3)
Commands Without Sudo (1)
workflow-manager
Total Commands: 12 | Auth Required: 1 | No Auth: 11
Command Reference
dns-leak
Total Commands: 4 | Auth Required: 1 | No Auth: 3
Commands Requiring Authentication (1)
Commands Without Authentication (3)
integrity-check
Total Commands: 7 | Auth Required: 0 | No Auth: 7
Commands Without Authentication (7)
online-info-switch
Total Commands: 7 | Auth Required: 0 | No Auth: 7
Command Reference
ip-fetch
Total Commands: 7 | Auth Required: 0 | No Auth: 7
Command Reference
online-auth
Total Commands: 20 | Auth Required: 14 | No Auth: 6
Commands Requiring Authentication (14)
Commands Without Authentication (6)
routing-switch
Total Commands: 18 | Auth Required: Mixed | No Auth: Mixed
Command Reference
dns-switch
Total Commands: 27 | Auth Required: 10 | No Auth: 17
Command Reference
tor-switch
Total Commands: 107 | Auth Required: 72 | No Auth: 35
Commands Requiring Authentication (72)
Commands Without Authentication (35)
health-control
Selected Commands: 185 | Auth Tagged: 104 | No Auth Tagged: 81
Note: Signer metadata currently lists 213 health-control commands. The chips below are a curated operational subset for readability.
Commands Requiring Authentication (176)
Commands Without Authentication (33)
ai-cmd
Total Commands: 13 | Auth Required: 0 | No Auth: 13
Command Reference
ai-trainer
Total Commands: 8 | Auth Required: 0 | No Auth: 8
All Commands - No Authentication Required (8)
ai-learner
Total Commands: 4 | Auth Required: 0 | No Auth: 4
Command Reference
ai-admin
Total Commands: 3 | Auth Required: 0 | No Auth: 3
All Commands - No Authentication Required (3)
ai-discovery
Total Commands: 3 | Auth Required: 0 | No Auth: 3
All Commands - No Authentication Required (3)
ai-scheduler
Total Commands: 4 | Auth Required: 0 | No Auth: 4
All Commands - No Authentication Required (4)
ai-monitor
Total Commands: 4 | Auth Required: 0 | No Auth: 4
All Commands - No Authentication Required (4)
ai-gateway
Total Commands: 9 | Auth Required: Policy-dependent | No Auth: Policy-dependent
Command Reference
kodachi-claw
Total Commands: 20 | Auth Required: 16 | No Auth: 4
Command Reference
System Requirements and Permissions
Privilege Escalation Requirements
| Operation Type | Required Permissions | Affected Binaries |
|---|---|---|
| Network Configuration | sudo/root | tor-switch (iptables/nftables), routing-switch, dns-switch |
| System Security | sudo/root | health-control (network/MAC/hostname operations) |
| Authentication Management | sudo/root | online-auth (system-wide operations) |
| Read-Only Operations | Standard user | ip-fetch, dns-leak, integrity-check, logs-hook, conky-status |
| AI Operations | Standard user | ai-cmd, ai-trainer, ai-learner, ai-admin, ai-discovery, ai-scheduler, ai-monitor, ai-gateway |
| Anonymous Agent Runtime | sudo/root | kodachi-claw (Tor circuits, identity randomization, namespace isolation) |
Service Daemon Capabilities
| Service | Daemon Mode | Command | Purpose |
|---|---|---|---|
| online-auth | Heartbeat daemon | online-auth authenticate --keep-alive or --relogin |
Maintains authentication session |
| logs-hook | Integrated by all services | Automatic | Centralized logging for all operations |
| global-launcher | Service management | Standalone | Binary deployment and management |
| ai-monitor | Background daemon | ai-monitor start --daemon |
Proactive VPN/Tor/DNS monitoring |
| ai-scheduler | Background daemon | ai-scheduler start |
Cron-based automated task execution |
| ai-discovery | Background daemon | ai-discovery start |
Binary watcher and auto-indexer |
| kodachi-claw | Background daemon | kodachi-claw daemon |
Anonymous AI agent runtime with embedded Tor |
Key Capabilities Overview
Advanced Network Operations
| Feature | Capability | Details |
|---|---|---|
| Tor Operations | 70+ Commands | Complete control over instances, circuits, and exit nodes |
| Load Balancing | Native Kernel-Level | Traffic distribution across multiple Tor instances |
| Protocol Support | 12 Protocols | OpenVPN, WireGuard, Tor, Shadowsocks, V2Ray, Xray variants, and more |
| DNS Resolvers | 50+ Options | DNSCrypt, DoT, DoH, Pi-hole integration |
Security and Protection
| Feature | Implementation | Purpose |
|---|---|---|
| Emergency Kill Switch | health-control kill-network |
Instant network termination |
| Panic System | 3 Levels (Soft/Medium/Hard) | Progressive data destruction |
| Data Wiping | Multi-pass shredding | Secure deletion with verification |
| MAC Randomization | Auto/Manual modes | Hardware address anonymization |
| Hostname Management | Random generation | System identity protection |
System Integration
| Aspect | Approach | Benefit |
|---|---|---|
| Memory Safety | Rust-first implementation | Robust error handling, no crashes |
| Performance | Optimized binaries | Fast response for critical operations |
| Output Format | JSON-first design | Easy automation and scripting |
| Path Detection | Dynamic resolution | Works on any Linux environment |
| Containment | Execution folder only | Enhanced security isolation |
Common Workflows
Network Anonymization Setup
# Authenticate and configure Torsudoonline-authauthenticate# Basic authentication# Or use --relogin for automatic reconnection on session expirysudoonline-authauthenticate--reloginsudotor-switchstart-torsudotor-switchtorrify-system-nftables# Prefer nftables (modern)# sudo tor-switch torrify-system-iptables # Alternative: iptables (legacy)ip-fetchfetch# Fetch current IP info through Tor (ISP/ASN shows Tor exit node)
Multi-Protocol Routing
# Connect through various protocolssudorouting-switchconnectopenvpnsudorouting-switchconnectshadowsockssudorouting-switchconnectwireguardsudorouting-switchstatus# Check active routingsudorouting-switchlist-protocols# List available protocols with scoressudorouting-switchdisconnect# Disconnect current protocol
Security Hardening
# System hardening workflowsudohealth-controlset-random-hostnamesudohealth-controlmac-change-allsudopermission-guardscansudointegrity-checkcheck-integrity--json
DNS Configuration
# Secure DNS setupdns-switchstatus--json# Read current DNS mode/status (no sudo)dns-switchdnscrypt-monitor-status--json# Monitor DNSCrypt watchdog statesudodns-switchswitch--categoryencrypted# Use encrypted DNSdns-leakdiscover--json# Discover and analyze DNS configurationsudodns-switchrandom--typeencrypted--count3# Use random encrypted resolverssudodns-switchfix-dns# Emergency DNS repair fallbacksudodns-switchfix-dns--force# Run complete DNS repair chain
Emergency Response
# Quick privacy modesudohealth-controlpanic-softsudotor-switchrestart-tor# Get new Tor circuitsudohealth-controlrecover-internet--check-dns# Recover connectivity + DNS if neededsudohealth-controlfast-recover-internet--force# Force quick recovery then escalate if still unhealthy# Complete shutdownsudohealth-controlkill-networksudohealth-controlwipe-logs
Keep Internet Alive (Auto-Recovery Loop)
# Keeps checking connectivity recovery every 10s.
# Starts recover-internet only if another recovery process is not already running.
while true; do
if ! pgrep -fx "health-control recover-internet" > /dev/null; then
sudo health-control recover-internet &
fi
sleep 10
done
Performance Metrics
Documentation Structure
User Guides
| Category | Description |
|---|---|
| Network Tools | Detailed guides for network and anonymization tools |
| Security Tools | Comprehensive security and authentication documentation |
| Protection Tools | System protection and monitoring guides |
| Infrastructure Tools | Service infrastructure and management documentation |
| AI & Intelligence Tools | AI-powered command interface, monitoring, and automation |
API Reference
| Reference | Description |
|---|---|
| Binary Reference | Complete command-line API documentation for all binaries |
Security Considerations
Important Security Notice
These tools provide powerful capabilities that should be used responsibly and in accordance with local laws and regulations. Kodachi OS and its binaries are designed for legitimate privacy protection and security testing purposes only.
Security Implementation Details
| Feature | Implementation |
|---|---|
| Authentication | Services use KODACHI_CALLING_SERVICE environment variable for identity |
| Certificate Pinning | TLS 1.3 with pinned certificates for network operations |
| Error Handling | Comprehensive error propagation without crashes |
| Audit Trail | All operations logged through centralized logs-hook service |
Example JSON error response structure:
{
"status": "error",
"error": {
"code": "AUTH_FAILED",
"message": "Authentication required",
"details": "Service requires valid authentication token",
"timestamp": "2025-09-19T10:00:00Z"
}
}
Authentication Flow
| Step | Command | Purpose |
|---|---|---|
| 1 | sudo online-auth authenticate --keep-alive or --relogin |
Initial authentication (--relogin includes keep-alive) |
| 2 | online-auth check-login |
Check authentication status |
| 3 | Service usage | Authenticated services automatically verify before execution |
| 4 | online-auth logout |
Logout when finished |
System Information
| Component | Version | Build Date | License |
|---|---|---|---|
| Kodachi OS | 9.0.1 | 2025 | Proprietary |
| Rust Binaries | 9.0.1 | 2025-09-18 | Proprietary |
| Documentation | 9.0.1 | 2025-09-19 | © 2025 Linux Kodachi |
| Author | Warith Al Maawali | - | All Rights Reserved |