Provably secure AI compute

Run OpenClaw, Ollama, and any AI workload on hardware-sealed Intel TDX VMs. Cryptographic attestation proves your code runs unmodified. Nobody can read your data — not us, not the cloud provider, not anyone.

Fleet Dashboard View Source
TDX AttestedHardware-sealed memory
4 Binariesdd-client, dd-register, dd-web, easyenclave
Open SourceMIT license

How It Works

Three steps from code to provably secure production.

1

Deploy

Push your container image via GitHub Actions. The deploy-workload action POSTs your deploy spec to dd-agent's API through the Cloudflare tunnel. No SSH keys, no raw IPs.

2

Attest

The TDX VM generates a cryptographic quote proving the exact code running inside the enclave. EasyEnclave's attestation API lets you verify the measurement against known-good builds.

3

Run

Your workload runs inside hardware-encrypted memory. The fleet dashboard shows health, metrics, and attestation status across all your agents. Logs stay inside the enclave boundary.

Features

Everything you need for confidential AI workloads.

🔐

TDX Attestation

Intel TDX hardware seals your VM's memory. Cryptographic quotes prove your workload is unmodified. Verify remotely before sending secrets.

📊

Fleet Management

dd-web dashboard shows all agents across your infrastructure. Prometheus-style collector scrapes /health. Federation for horizontal scaling.

🚀

API-Driven Deploys

GitHub Actions deploy workloads via POST /deploy. No SSH. GITHUB_TOKEN auth works out of the box. Retry logic handles tunnel instability.

BTC Payments

Pay for compute with Bitcoin via satsforcompute. No credit cards, no KYC, no middlemen. Lightning for instant settlement.

🛡

Enclave Runtime

Powered by EasyEnclave — the open-source PID 1 that runs inside the sealed VM. Unix socket API. No networking in the runtime. Minimal attack surface.

🌐

Cloudflare Tunnels

Every agent gets a tunnel hostname. No public IPs, no firewall rules, no port forwarding. dd-register provisions tunnels automatically on registration.

Architecture

4 binaries, 2 repos, zero trust.

Customer (browser)
  |
  v
Cloudflare Edge ──── tunnel ────> TDX VM
                                    |
                            easyenclave (PID 1)
                            ├── unix socket API
                            ├── workload: dd-client
                            │   ├── web dashboard + terminal
                            │   ├── /health, /deploy, /exec
                            │   └── Noise WS ──> dd-register
                            └── workload: openclaw + ollama
                                └── gemma4:e2b (CPU inference)

dd-web (fleet dashboard, N instances)
  ├── discovers agents via CF tunnels
  ├── scrapes /health (Prometheus-style)
  ├── GitHub OAuth + JWT auth
  └── /federate for horizontal scaling

Deploy with GitHub Actions

One action to deploy. One action to verify.

.github/workflows/deploy.yml
- uses: devopsdefender/dd/.github/actions/deploy-workload@main
  with:
    agent-url: https://app.devopsdefender.com
    deploy-spec: apps/myapp/deploy.json

- uses: devopsdefender/dd/.github/actions/verify-deployment@main
  with:
    agent-url: https://app.devopsdefender.com
    deployment: myapp
    timeout: 300

Powered by EasyEnclave

The open-source enclave runtime that makes confidential computing simple. Runs as PID 1 in Intel TDX VMs. Unix socket API. No networking in the runtime.

Learn More

Provably secure. Open source. Yours.

Read every line. Audit every build. Verify every machine.

Get Started View on GitHub