This is the umbrella repository for the SecretVM project, a comprehensive platform for building, operating, and securing confidential virtual machines (CVMs) using Trusted Execution Environment (TEE) technologies.
Repository | Description |
---|---|
secret-vm-build | Yocto-based reproducible build system for creating SecretVM artifacts |
secret-vm-ops | Operational tools for SecretVM runtime |
secret-vm-kms | On-chain Key Management System for secure key distribution |
secret-vm-attest-rest-server | A web server runing inside the SecretVM, exposing attestation and logs |
reproduce-mr | A CLI tool for calculating attestation measurements for SecretVM images |
The SecretVM Build System creates reproducible, secure VM images that serve as the foundation for confidential computing environments.
Key Features:
- Creates reproducible VM images with attestation capabilities
- Builds both CPU-only and GPU-enabled configurations
- Produces trusted boot components (kernel, initramfs, UEFI firmware)
- Designed for production-grade security
This repository contains the operational tools required for running and managing SecretVMs.
Key Features:
- Secure VM startup scripts with attestation
- SSL certificate generation and management
- Cryptographic operations tooling
- Secure storage initialization and management
The Key Management System provides a framework for secure cryptographic key management through attestation-based validation. The KMS is implemented as a Smart Contract running on Secret Network
Key Features:
- Service key management with attestation-based access control
- Image-specific secret key distribution
- Environment secret management
A lightweight REST server that provides attestation reports for confidential VMs over HTTPS.
Key Features:
- Multiple attestation endpoints (GPU, CPU, self)
- Secure communication with TLS
- Visualization of attestation data
- Docker integration for container monitoring
- Confidential AI: Privacy-preserving machine learning workloads
- AI Agents: Verifible AI agents
- MCP Servers: Model-Context Protocol server, exposing additional capabilities to LLMs
- Secure Blockchain Operations: Protection for sensitive blockchain operations
- Regulated Data Processing: Compliant processing of sensitive data
- Multi-party Computation: Secure collaboration on sensitive data
A command-line tool that emulates the calculation of attesation registers (MRTD, RTMR0, RTMR1, RTMR2, RTMR3)
Key Features:
- Calculates the expected values of all attestation registers based on given VM artifacts, docker-compose.yaml and other parameters
- Used to verify the chain of trust, ensuring that a given SecretVM is indeed built from given artifacts