IridiumOS is a FixCraft Inc. ® 2020-2025 community fork of AnuraOS by Mercury Workshop, and FixCraft Inc. is an independent company that took over and continues the project with stronger privacy defaults, speed, and a low‑profile footprint — all running locally in your browser. It’s an entirely local browser‑based "OS" and development environment with complete graphical Linux emulation, visually based on ChromiumOS.
Warning
IridiumOS mainly targets Chromium but should work on most browsers. For a list of known browser specific quirks check this document.
IridiumOS uses the features of a PWA (Progressive Web App) to make its environment work fully offline, providing a virtual filesystem (synced with the Linux emulator), a code editor, and a modular and extensible app system. You can even edit IridiumOS's code live while inside of it!
IridiumOS shows as more of a proof‑of‑concept with what's possible on the modern web rather than an actual product. However, it proves useful in many actual cases and is a useful educational tool.

- Origin hardening: Cloudflare-aware TLS bootstrap, automatic certificate selection (Cloudflare origin vs. native
fullchain.pem/privkey.pem), and zero-tolerance direct-IP blocking with a friendly “Firewall‑chan” page keep the server reachable only through approved hostnames. - Cloudflare tunnel mode: Set
CF_TUNNEL_MODE=trueto runserver.json a Unix domain socket (with a loopback HTTP fallback) tailored forcloudflared, so no WAN ports are required and the namespace automatically skips DNAT exposure. - Runtime safeguards: Local DDoS guard, tight HTTP/HTTPS timeouts, privilege dropping after binding privileged ports, and optional HTTP→HTTPS forwarding make it harder to knock over the origin even when Cloudflare is disabled.
- Namespace sandbox module: A configurable ir_module (with a friendly emoji UI) can pin
server.jsinside a dedicated network namespace, optionally light up WireGuard inside that namespace, and still expose only HTTPS/HTTP-forwarded traffic to the WAN. See documentation/server-sandbox.md. - Human verification everywhere: Turnstile secrets/site keys now live in
.env(and are required wheneverUSE_CF=true). The login page consumes these values dynamically and can optionally inject Google Tag Manager IDs without embedding secrets in the static HTML. - SSO secret hygiene:
FC_SSO_SECRETauto-rotates to a cryptographically random 32-byte value whenever it is missing or weak, and is persisted back into your.envso deployments never run with unsafe defaults. - Automated VPN detection: The bundled VPN/IP reputation database is hydrated at boot, and users see a clear explanation page when their IP is blocked.
- Developer ergonomics:
HEALTH.shoffers deterministic environment validation (with--jsonoutput), andtryinstall.shcan self-heal a Debian/Ubuntu host by installing Node ≥20, OpenJDK ≥11, multilib toolchains, Docker, and Rust targets even if only a single prerequisite originally failed. - Login alerts + announcements: Successful logins trigger push/email-style notifications that include IP + country metadata. Admins can broadcast announcements via the REST API or the built-in loopback endpoint (
127.0.0.1:6767/announce) and the helper scriptannounce.sh.
- Login notifications: All successful logins (main site + APISRV) enqueue a notification to the signed-in user with IP and country info (headers or GeoLite lookup when available).
- Push delivery:
/api/notifications/subscribeand/api/notifications/events/ackare untouched by the service worker; events are queued server-side and delivered even if the UI isn’t open. - Admin broadcasts: Use
./announce.sh -t "Title" -m "Message" [-s "https://link"]on the host to fan out to all users via the loopback-only endpointhttp://127.0.0.1:6767/announce. You can also call/api/admin/announcementswith Basic auth as an admin user.
Important
IridiumOS will not build on Windows. Please use a Linux VM or WSL.
- Run
source codespace-basic-setup.sh
Note
- If you are not in a codespace skip to the regular installation steps.
- This does NOT build RootFS.
- Recent versions of
node.jsandnpm wget- A recent version of
java(11+) inotifytoolsrustupwasm-optmakegcc(gcc-multilibon Debian and Ubuntu x86_64)- 32 bit version of
glibc(needed for building rootfs,lib32-glibcon Arch Linux) clanguuid-runtimejqdocker- An x86(-64) Linux PC (
make rootfs-alpinebuild depends on x86 specific tools)
Tip
Run ./HEALTH.sh after cloning to get a full compatibility report (or ./HEALTH.sh --json for automation).
On Debian/Ubuntu you can fix every failed check in one go with ./tryinstall.sh, which installs/upgrades Node ≥20, OpenJDK ≥11, multilib toolchains, Docker, and the required Rust targets even if you only had a single red item.
Note
You will have to install the required Rust toolchain by running rustup target add wasm32-unknown-unknown and also rustup target add i686-unknown-linux-gnu if you are planning to build v86 images.
- Clone this repository (
git clone --recursive <this-repo-url>) - Then,
make all
Tip
You can use make all -B instead if you want to force a full build.
- Make sure you have
Dockerinstalled and running. - Make sure to add yourself to the Docker group using
usermod -a -G docker $USER - Run
make rootfs
You can run IridiumOS with the command
make serverIridiumOS should now be running at localhost:8000.
App development is highly encouraged! Good apps can even be added to the official app repositories after review by an IridiumOS maintainer. Apps are stored in .app files which are read by IridiumOS to provide you, well, an app!
For more information about developing an IridiumOS app please visit this page and for using Iridium (Anura‑compatible) APIs in your code, please visit this page.
See the current index of documentation here.
See SECURITY.md for reporting instructions.
- IridiumOS is a FixCraft Inc. ® 2020-2025 community fork of AnuraOS — FixCraft Inc. is an independent company that took over the project from Mercury Workshop and continues it today.
- Linux emulation is based on the v86 project.
- For more credits, see CREDITS.MD.
(p.s. for hackers: the entrypoint to IridiumOS is src/Boot.tsx)
- More private: Local‑first, offline‑capable operation and no telemetry by default.
- Faster: Lean defaults and optimizations for a responsive experience.
- Low‑profile: Minimal network surface and a discreet UI for a quieter footprint.
- School/Organization policy block bypass

