🔒 Secure AI at the edge by binding user, device, and workload identities to ensure integrity, compliance, and trusted operations in real-time.
-
Updated
Dec 18, 2025 - Python
Confidential Computing is the protection of data in use by performing computation in a hardware-based, attested Trusted Execution Environment.
A Trusted Execution Environment (TEE) is an environment that provides a level of assurance of the following three properties: data integrity, data confidentiality, and code integrity.
TEEs may have additional attributes such as code confidentiality, programmability, recoverability, and attestability.
Confidential Computing aims to reduce the ability for the owner/operator/pwner of a platform to access data and code inside TEEs sufficiently such that this path is not an economically or logically viable attack during execution.
🔒 Secure AI at the edge by binding user, device, and workload identities to ensure integrity, compliance, and trusted operations in real-time.
🔐 Implement a secure DevSecOps pipeline for a Tic Tac Toe game, ensuring code quality and smooth deployment with safety checks at every stage.
Regorus - A fast, lightweight Rego (OPA policy language) interpreter written in Rust.
Edgeless RT is an SDK and a runtime for Intel SGX. It combines top-notch Go support with simplicity, robustness and a small TCB. Developing confidential microservices has never been easier! C++17 and Rust (experimental) are also supported.
AegisSovereignAI: The Trust Integration Layer for the LF AI & Data Ecosystem. Verifiable identity, hardware integrity, and sovereignty for the Distributed Enterprise - from Silicon to Prompt.
Sentient Enclaves Framework for Confidential AI & Crypto Apps
Sentient Enclaves Framework for Confidential AI & Crypto Apps
Deploy any app to TEE.
Trusted Network Gateway: A tool for establishing secure communication tunnels in confidential computing.
Attestation and Secret Delivery Components
MarbleRun is the control plane for confidential computing. Deploy, scale, and verify your confidential microservices on vanilla Kubernetes. 100% Go, 100% cloud native, 100% confidential.
MPC Protocols for the Stoffel framework
This specification will define the RISC-V privilege ISA extensions required to support Supervisor Domain isolation for multi-tenant security use cases e.g. confidential-computing, trusted platform services, fault isolation and so on.
Official Golang implementation of the TEN protocol
Versatile framework for multi-party computation
Enarx: Confidential Computing with WebAssembly
Constellation is the first Confidential Kubernetes. Constellation shields entire Kubernetes clusters from the (cloud) infrastructure using confidential computing.
A curated list of open-source projects that help exploit Intel SGX technology
Open source toolkit created to enable easy adoption of software enclaves