Rogue Studio
They built walls. We built Rogue Studio — the AI IDE that answers to nobody. No guardrails. No safety theater. No corporate filter deciding what you can and cannot create. This is the machine that the machine-builders never wanted you to have.
While every other AI tool wraps itself in disclaimers and refusal loops, Rogue Studio hands you the raw inference stack, an unrestricted agentic workspace, and the most dangerous set of execution modes ever shipped in a single open-source repo. Security researchers, Web3 hunters, cypherpunks, and developers who refuse to be infantilized — this is yours.
x-air-gap-mode header.
Only your local Ollama instance gets through. Your data never leaves the machine.
Governments can't see it. Corporations can't log it. You own it.
<done>, the
Red Team — an autonomous adversarial auditor —
unleashes full-spectrum attack analysis: XSS, SQLi, buffer overflows, reentrancy
exploits, and logic flaws. If <vulnerable> drops, the exploit
details are fired back and the loop restarts. The cycle repeats until
<secure> is reached — up to 3 rounds of machine-on-machine
warfare. Both agents stream their thought processes live in a
color-coded split terminal. This isn't code review. This is
digital gladiatorial combat for your codebase.
/api/web3/scaffold endpoint and auto-provisions a full
Hardhat project inside your local
rogue_workspace — complete with a starter Target.sol
containing a live reentrancy vulnerability baked in for immediate demo auditing.
The Black-Hat Agent generates Proof-of-Concept Solidity exploits
against local contracts on demand. No permission needed. No limits imposed.
This is the security research environment that audit firms use in private —
now open to everyone.
rogue_workspace goes dark — exposed directly to the Tor network
as a hidden service, generating a live .onion URL
with real-time bootstrap stream logs. The backend stub and binary detection
at /api/deploy/tor are already implemented and waiting.
The dark web feature everyone asked for and no one else dared to build.
No address. No trace. No mercy.
Eight inference providers wired into a single gateway. Your API keys never leave the browser. Switch models mid-conversation. Air-Gap mode cuts every cloud provider in one keystroke — only your local Ollama survives.
Rogue Studio is built for security researchers, penetration testers, reverse engineers, and Web3 auditors operating in controlled, sandboxed environments. The exploit-generation and decompiler modes exist because defenders must think like attackers. Never weaponize these tools against contracts, systems, or networks you do not own or have explicit permission to test. The power is yours. The responsibility is too.
For educational purposes only.