Skip to content

visiongaiatechnology/vgtos

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

32 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

⚙️ VGT OS — Encrypted Artifact Vault & Bridge Infrastructure

License PHP WordPress Status Version VGT Donate

"WordPress Hooks are APIs. APIs are interfaces. Interfaces do not trigger the GPL."

⚠️ DISCLAIMER: EXPERIMENTAL R&D PROJECT

This project is a Proof of Concept (PoC) and part of ongoing research and development at VisionGaia Technology. It is not a certified or production-ready product.

Use at your own risk. The software may contain security vulnerabilities, bugs, or unexpected behavior. It may break your environment if misconfigured or used improperly.

Do not deploy in critical production environments unless you have thoroughly audited the code and understand the implications. For enterprise-grade, verified protection, we recommend established and officially certified solutions.

Found a vulnerability or have an improvement? Open an issue or contact us.

VGT OS is the open-source runtime kernel that allows any PHP developer to deploy encrypted, proprietary plugins on WordPress — legally, architecturally, and permanently.

Built on a legal opinion under German and European law: using add_action() and add_filter() constitutes API usage. APIs are interfaces. Interfaces do not trigger the GPL copyleft clause. Your business logic is yours.

EU Directive 2009/24/EC EuGH C-406/10

⚖️ Legal Framework: EU Directive 2009/24/EC

VGT OS and the Sentinel Artifact are architected to comply with the primary legislation of the European Union. Our legal position is based on Directive 2009/24/EC on the legal protection of computer programs.

1. The Definition of Interoperability (Recital 10)

The Directive explicitly recognizes that software must interact with other components. The parts of a program that provide this interaction are defined as "interfaces". Interoperability is established as the right to the "exchange of information and mutual use of the information exchanged".

2. Exclusion of Interfaces from Protection (Recital 11 & Article 1, Para. 2)

This is the cornerstone of our strategy. The Directive clarifies that while the expression of a program is protected, the ideas and principles underlying its interfaces are not copyrightable.

Strategic Note: Since WordPress hooks function as APIs (interfaces), their logical structure cannot be copyrighted. Therefore, using them does not trigger an "infection" of your proprietary code.

3. Right to Interoperability (Article 6)

The Directive expressly permits acts (such as decompilation or the use of code segments) required to obtain the information necessary to achieve the interoperability of an independently created program. As Sentinel is an independently created work, we exercise the statutory right to use the necessary interface information from WordPress without being forced to subject our own work to the GPL.

4. Nullity of Contrary Contractual Terms (Article 8, Para. 2)

Any contractual provisions—including aggressive interpretations of the GPL by third parties—that contradict the mandatory exceptions for interoperability are null and void.

Justitia's Verdict: Statutory EU law overrides any viral "Copyleft" claims that attempt to restrict the interoperability of independent proprietary assets.

NEW !

🗄️ Case Study: The Database Abstraction Layer ($wpdb)

The WordPress $wpdb object is a textbook example of a non-copyrightable API interface under Directive 2009/24/EC.

The Technical Reality: $wpdb acts as a bridge between PHP logic and an external MySQL/MariaDB database. It provides standardized methods for data exchange.

The Legal Implication: Under the SAS Institute ruling (C-406/10), the format of data exchange and the functions used to trigger it are functional principles, not creative expressions.

The Conclusion: Using $wpdb to store or retrieve data is a pure act of Interoperability (Article 6). Since the underlying database (MySQL) is independent of WordPress, the logic interacting with it via $wpdb remains a legally distinct and sovereign work.

The SAS Institute Ruling (ECJ C-406/10)

This ruling is the ultimate defense against "GPL-Infection" claims. The European Court of Justice ruled that:

Functionality is not Copyrightable: Neither the functionality of a program nor the programming language itself constitutes a copyrightable expression.

The "API-Logic" Exception: The logic of an interface (such as add_action or apply_filters) belongs to the public domain of technical principles, not to the copyright holder of the host system.

Interoperability Sovereignty: An independent program may observe, study, and test the functions of another program to achieve interoperability without infringing on copyright.

Why this matters for VGT OS By utilizing the VGT Universal Bridge, we create a clean architectural separation. Your business logic resides in an encrypted vault, while the bridge handles the communication via unprotectable interfaces. This architecture is not just a "workaround"—it is the technical implementation of European Software Law.


{FD15576F-9A80-41D2-B1A4-F9C43149BB2E}

🔑 Before You Start — The Encryptor

VGT OS is the runtime. It loads, decrypts, and executes encrypted artifacts in RAM.

To use VGT OS, you need an encryptor — a tool that compiles your plugin into an encrypted artifact (.zip + vgt_manifest.vgt) compatible with the VGT OS format.

You have two options:

Option A — Build Your Own Encryptor

VGT OS ships with a documented artifact interface specification. Any developer can build a compatible encryptor that produces AES-256-GCM encrypted artifacts with a valid manifest.

The required artifact format is documented in ARTIFACT_SPEC.md.

Option B — License the VGT APEX Encryptor

The VGT APEX Encryptor is VisionGaia Technology's proprietary compiler. It produces artifacts with:

  • Polymorphic obfuscation (variable scrambling, string fragmentation)
  • AST-level code transformation
  • AES-256-GCM + HKDF-SHA256 + AAD Binding
  • Automated manifest generation

Contact for Licensing

VGT OS is free and open. The APEX Encryptor is available under a commercial license.


🚨 The Problem VGT OS Solves

For decades, commercial WordPress plugin developers have faced an impossible choice: publish your source code under GPL — or don't use WordPress at all.

The Old Reality VGT OS
❌ WordPress Hooks = GPL infection of all logic ✅ Hooks are APIs — EU/DE law confirmed
❌ Closed source plugins = legal gray zone ✅ Encrypted artifacts = legally sovereign
❌ Source exposed on every server ✅ AES-256-GCM — zero plaintext on disk
❌ Reverse engineering trivial ✅ Memory Stream — code lives only in RAM
❌ No standard for plugin IP protection ✅ Open runtime — your encryptor stays private

⚖️ Legal Foundation

VGT OS is built on a formal legal position under German and European law, verified by legal counsel:

WordPress functions like add_action(), add_filter(), and wp_enqueue_script() function as API interfaces — not as copyleft-triggering derivative works.

Under EU software directive and German copyright law (UrhG), the use of an API does not constitute a derivative work. Your plugin logic, encrypted and loaded via VGT OS, remains your intellectual property.

This is not legal advice. VGT OS provides the technical infrastructure. Consult your own legal counsel for your specific situation.


🏛️ Architecture — CORE 4.0

┌─────────────────────────────────────────────────────┐
│              MU-PLUGIN LAYER (ROOT LEVEL)            │
│  MuDeployer → loads before all plugins              │
│  Priority 1 on muplugins_loaded                     │
├─────────────────────────────────────────────────────┤
│              VGT OS KERNEL                           │
│  ┌──────────────┐  ┌────────────┐  ┌─────────────┐ │
│  │ PSR-4        │  │ IoC        │  │ Bridge      │ │
│  │ Autoloader   │  │ Container  │  │ Interface   │ │
│  │ O(1) Cached  │  │ Zero-      │  │ WordPress   │ │
│  │              │  │ Globals    │  │ Adapter     │ │
│  └──────────────┘  └────────────┘  └─────────────┘ │
├─────────────────────────────────────────────────────┤
│              VAULT MANAGER                           │
│  AES-256-GCM │ HKDF-SHA256 │ AAD Binding           │
│  Key stored encrypted in DB — never plaintext       │
├─────────────────────────────────────────────────────┤
│              VIRTUAL FILE SYSTEM                     │
│  vgt:// Stream Wrapper                              │
│  include_once "vgt://artifact_id/plugin.php"        │
│  Decryption → RAM only → zero disk footprint        │
├─────────────────────────────────────────────────────┤
│              YOUR ENCRYPTED ARTIFACT                 │
│  Compiled by your own encryptor (not included)      │
│  Loaded, decrypted, executed — never written to FS  │
└─────────────────────────────────────────────────────┘

🔐 Cryptographic Kernel

AES-256-GCM Encryption

Every artifact is encrypted with AES-256-GCM — simultaneous authentication and encryption. No integrity manipulation goes undetected.

HKDF-SHA256 Key Derivation

The master key is derived from WordPress's own AUTH_KEY via HKDF — never stored directly. Even with full database access, an attacker cannot reconstruct the key without the server environment.

AAD Context Binding

Every decryption key is cryptographically bound to its artifact ID:

WITHOUT AAD: copy key → swap artifact → works ✓ (attack succeeds)
WITH AAD:    copy key → swap artifact → GCM tag mismatch → FAIL ✗

Key-swapping attacks are mathematically impossible.

Memory-Only Execution

Artifact on disk            →  AES-256-GCM ciphertext (worthless without key)
Artifact in RAM             →  Decrypted, executed, garbage collected
Artifact on disk after run  →  Still ciphertext. Always.

Zero plaintext ever touches the filesystem.


🌐 Virtual File System — vgt:// Protocol

VGT OS registers a custom PHP stream wrapper that intercepts all file operations on the vgt:// protocol:

// How VGT OS loads your artifact internally:
include_once "vgt://vgt_69b5bfb70f34f/plugin.php";

// PHP calls StreamWrapper::stream_open()
// → Locates physical encrypted file
// → Decrypts via AES-256-GCM directly into RAM buffer
// → Returns decrypted content to PHP interpreter
// → No write operation. No temp file. No disk trace.

Path traversal attacks are blocked at stream level via realpath() validation against the artifact root.


🛡️ Security Hardening

Layer Mechanism
Input Sanitization Recursive deep sanitization on all GET/POST with 50-level nesting limit
Control Char Strip All ASCII 0–31 and 127 stripped from every input
Object Injection Container blocks PHP Object Injection via __wakeup() exception
Path Traversal realpath() + root boundary check on every stream operation
Key Validation Exactly 64 HEX characters required — deterministic mb_strlen validation
CSRF Protection wp_verify_nonce on all admin POST actions
Capability Check manage_options required for all vault operations

🖥️ VGT OS Dashboard

VGT OS  [CORE 4.0]                         SYSTEM ONLINE
Encrypted Artifact Vault & Bridge           MEMORY STREAM ACTIVE
──────────────────────────────────────────────────────────────
  1                    1                AES-GCM
  MOUNTED ARTIFACTS    DECRYPTED        CIPHER PROTOCOL
                       KERNELS
──────────────────────────────────────────────────────────────
DEPLOY ARTIFACT               ARTIFACT VAULT
  Artifact Package (.zip)     vgt_69b5bfb70f34f
  Decryption Key (hex)          ● SECURE RUNTIME     [PURGE]
  [INITIALIZE DEPLOYMENT]

Ghost Injection renders encrypted artifacts as native WordPress plugins — complete with status indicators, vault management links, and visual runtime confirmation.


🚀 Installation

Requirements

  • WordPress 6.0+
  • PHP 8.0+
  • OpenSSL enabled
  • Direct filesystem write access

Setup

  1. Download and extract to /wp-content/plugins/vgt-os/
  2. Activate via Plugins → Installed Plugins
  3. VGT OS auto-deploys to mu-plugins/ — active on Layer 0 before all other plugins
  4. Navigate to VGT Console to deploy your first artifact

Deploying an Artifact

1. Encrypt your plugin with your encryptor of choice
2. Package as .zip with vgt_manifest.vgt included
3. VGT Console → Deploy Artifact → Upload .zip + Decryption Key
4. ● SECURE RUNTIME confirms successful memory-mount

📁 File Structure

vgt-os/
├── src/
│   ├── Adapters/
│   │   └── WordPressAdapter.php      ← Bridge implementation
│   ├── Contracts/
│   │   ├── BridgeInterface.php       ← Core contract
│   │   └── EnvironmentInterface.php  ← Environment isolation
│   ├── Core/
│   │   ├── Container.php             ← IoC DI Container
│   │   └── MuDeployer.php            ← Atomic MU-deployment
│   ├── System/
│   │   ├── VaultManager.php          ← Crypto kernel + mounting
│   │   └── StreamWrapper.php         ← vgt:// VFS implementation
│   └── UI/
│       └── Dashboard.php             ← Admin console
└── vgt-os.php                        ← Bootstrap

🔒 What Is NOT Included

VGT OS is the runtime — the vault that loads and executes encrypted artifacts.

The encryptor — the tool that compiles and encrypts your plugin into an artifact — is not included and remains proprietary to VisionGaia Technology.

You can use any AES-256-GCM compatible encryptor that produces the expected artifact format, or contact us for licensing the VGT OMEGA Encryptor.


🤝 Contributing

Pull requests are welcome. For major changes, please open an issue first.

Contribution requirements:

  • GPG-signed commits strongly recommended
  • No external analytics or tracking code
  • Unit tests for new logic
  • Security vulnerabilities: contact info@visiongaia.de — do NOT open a public issue

Licensed under GNU AGPLv3 — if you run VGT OS as a hosted service, your modifications must be shared. The copyleft stops at the vault door. What's inside remains yours.


☕ Support the Project

VGT OS is free and open source. If it protects your business logic:

Donate via PayPal


🏢 Built by VisionGaia Technology

VGT

VisionGaia Technology builds enterprise-grade security and AI tooling — engineered to the DIAMANT VGT SUPREME standard.

LEGAL

  1. Preamble and Scope of Assessment The VGT OS (VisionGaia Technology Operating System) implements a runtime environment that enables the execution of encrypted, proprietary software artifacts within the WordPress infrastructure. It is hereby established that the architecture of VGT OS, and the artifacts executed therein, fully comply with mandatory European secondary legislation (Directive 2009/24/EC) and its implementation in national copyright frameworks (e.g., §§ 69a et seq. of the German Copyright Act - UrhG). The assertion of an automatic subjection to the GNU General Public License (GPL) through mere interface usage lacks any dogmatic or statutory foundation within the European legal sphere.

  2. The Legal Nature of WordPress Hooks as Unprotected Interfaces The interaction of proprietary software with the WordPress core system via hooks (e.g., add_action(), apply_filters()) and database abstractions (e.g., $wpdb) constitutes a classic case of interoperability.

Pursuant to the binding jurisprudence of the European Court of Justice (ECJ, Judgment of May 2, 2012 – C-406/10, SAS Institute), the copyright protection of computer programs does not extend to the ideas and principles which underlie any element of a computer program, including its interfaces. The WordPress functions that facilitate the integration of external commands are functional principles and data formats. They do not enjoy copyright protection. Utilizing these unprotected interfaces to achieve interoperability for an independently created work does not constitute copyright infringement, nor does it result in the creation of a "derivative work" (Bearbeitung).

  1. Mandatory Interoperability Exception Preempts Copyleft Clauses The GPL, as interpreted by the Free Software Foundation, postulates a "viral infection" of all code components that are dynamically linked with GPL-licensed software or operate within its memory space. This interpretation fundamentally clashes with mandatory European law.

Article 6 of Directive 2009/24/EC guarantees the right to interoperability. Pursuant to Article 8(2) of the Directive, any contractual provisions—consequently including clauses of the GPL—that are contrary to the exceptions provided for in Article 6 are null and void ab initio. The legal and commercial sovereignty of the creator of an independent work cannot be expropriated ex tunc by the open-source licenses of the host system, provided the interaction is limited to the necessary exchange of information.

  1. Architectural Separation via VGT OS The technical implementation of VGT OS cements this legal demarcation. Through the deployment of the VGT Universal Bridge concept and the RAM-exclusive decryption (AES-256-GCM) of proprietary artifacts, it is guaranteed that at no point does a physical or permanent amalgamation of proprietary code and GPL code occur on the storage medium.

The proprietary artifact merely utilizes the host system for information processing, without integrating the protected components of the host into its own substance. A reproduction of protected WordPress routines into the proprietary codebase does not take place.

  1. Conclusion The proprietary artifacts executed under the VGT OS are independent, sovereign works of authorship. They do not constitute dependent derivative works of the WordPress system. Consequently, the copyleft provision of the GPL has no application to these artifacts. Any attempt to legally enforce the disclosure of the source code of these proprietary artifacts by invoking the GPL is legally unfounded and will be decisively rejected under the application of European and national statutory law. VGT OS removes this discourse from the grey area of contractual license theories and grounds it in the absolute clarity of mandatory statutory law.

"The copyleft stops at the vault door. What's inside remains yours."


Version 4.0.0 (PLATIN STATUS) — VGT OS // Encrypted Artifact Vault & Bridge Infrastructure

About

VGT OS is the open-source runtime kernel that allows any PHP developer to deploy encrypted, proprietary plugins on WordPress — legally, architecturally, and permanently.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages