Confidential AI inference with hardware-backed attestation
Run AI models where prompts and weights stay encrypted — even if the host is compromised.
| Problem | Solution |
|---|---|
| Cloud hosts can see your data | TEE isolation — data decrypted only inside the enclave |
| "Trust me" isn't enough | Cryptographic attestation — verify code before sending secrets |
| No audit trail | Execution receipts — proof of what code processed your data |
Built for: Defense, GovCloud, Finance, Healthcare — anywhere "good enough" security isn't.
┌─────────┐ HPKE ┌─────────────┐ VSock ┌─────────────┐
│ Client │◄──────────────► │ Host (blind │◄────────────►│ Enclave │
└─────────┘ encrypted │ relay) │ encrypted └──────┬──────┘
└─────────────┘ │
│ │ NSM
│ S3 ▼
┌──────┴──────┐ ┌───────────────┐
│ Encrypted │ │ AWS KMS │
│ Models │ │ (key release) │
└─────────────┘ └───────────────┘
Key insight: Host never has keys. It just forwards ciphertext.
- ✅ Model weights (IP protection)
- ✅ Prompts & outputs (PII / classified data)
- ✅ Execution integrity (verified code)
- Attestation-gated key release — KMS releases DEK only if enclave PCRs match policy
- HPKE encrypted sessions — end-to-end encryption, host sees only ciphertext
- Ed25519 signed receipts — cryptographic proof of execution
- ✓ Compromised host OS → Protected (enclave isolation)
- ✓ Malicious cloud admin → Protected (can't decrypt)
- ✓ Supply chain attack → Detected (PCR verification)
- ✓ Model swap attack → Prevented (signed manifests)
- Nitro Enclave integration with real NSM attestation
- AWS KMS key release via RSA-2048 SPKI handshake
- VSock protocol for host↔enclave communication
- S3 model storage with client-side encryption
- Candle-based transformer inference (MiniLM, BERT, Llama)
- GGUF support for quantized models (int4, int8)
- BF16/safetensors format enforcement
- Memory-optimized for TEE constraints
- Attested Execution Receipts (AER) for audit
- 120+ unit tests passing
- Deterministic builds for reproducibility
- AWS account with Nitro Enclave support
- Rust 1.75+ (for local development)
- Terraform (for infrastructure)
# 1. Provision infrastructure
cd infra/hello-enclave
terraform init && terraform apply
# 2. Build enclave image
./scripts/build_enclave.sh
# 3. Run
nitro-cli run-enclave --eif-path enclave.eif --cpu-count 2 --memory 4096See QUICKSTART.md for detailed instructions.
| Component | Status |
|---|---|
| NSM Attestation | ✅ Production |
| KMS Integration | ✅ Production |
| VSock Protocol | ✅ Production |
| HPKE Sessions | ✅ Production |
| Inference Engine | ✅ Production |
| Receipt Signing | ✅ Production |
| Compliance Tools | 🚧 In Progress |
| Policy Updates | 📋 Planned |
Overall: 97% complete — E2E path verified on AWS Nitro.
docs/design.md— Architecture & threat modeldocs/tasks.md— Implementation progressQUICKSTART.md— Deployment guideSECURITY_DEMO.md— Security walkthrough
Apache 2.0 — see LICENSE
Run inference like the host is already hacked.