Deploy Confidential Applications in Minutes

The open-source, developer-friendly TEE SDK for secure, attestable computing

Transitioning to Linux Foundation

Convert any Docker container into a secure, verifiable application running in Trusted Execution Environments. No code changes required.

What is dstack?

A security-first SDK that simplifies deploying containerized applications into Trusted Execution Environments

Developer-Friendly TEE Deployment

dstack enables you to deploy Docker containers to secure, hardware-isolated environments with minimal configuration changes. Using familiar tools like docker-compose.yaml, you can have confidential applications running in production in minutes.

Built by a passionate open-source community, dstack provides production-ready security with full transparency and vendor independence through hardware-level trusted execution environments.

Key Benefits

✓ Zero Code Changes: Deploy existing Docker containers as-is
✓ Hardware-Level Security: TEE isolation protects data in use
✓ Remote Attestation: Cryptographically verify application integrity
✓ Vendor Independence: Decentralized trust model, no lock-in

Architecture Components

  • dstack-vmm - Manages Confidential VMs on TEE hosts
  • dstack-gateway - Reverse proxy for TLS connections
  • dstack-kms - Decentralized key management
  • dstack-guest-agent - In-CVM attestation service
  • meta-dstack - Yocto layer for guest images

Why Choose dstack?

Production-ready features designed for developers who care about security

Docker Native

Use familiar Docker Compose workflows. No proprietary tooling or steep learning curves.

Zero-Trust HTTPS

Automatic TLS termination with RA-HTTPS wrapping and certificate management built-in.

Secret Management

Client-side encrypted environment variables, decrypted securely within the TEE.

Remote Attestation

Cryptographic proof of execution environment with chain-of-trust visualization.

Decentralized KMS

Hardware-independent key derivation eliminates vendor lock-in and single points of failure.

Web Dashboard

Intuitive interface for deployment, monitoring, and log management via REST API.

Real-World Applications

Production deployments powering the next generation of secure applications

AI Agents & Inference

Run private AI agents and LLMs with full confidentiality. Process sensitive data without exposing it to cloud providers or infrastructure operators.

Used by: ai16z (Eliza), 0G, Morpheus, Lumerin

Programmable Privacy

Build privacy-preserving protocols and applications with custom TEE logic. Deploy Docker containers as privacy co-processors for existing blockchains.

Used by: Encifher

Blockchain Infrastructure

Secure cross-chain bridges, verifiable oracles, and confidential smart contracts. First Op-Succinct Layer 2 on Ethereum built with dstack.

Used by: Phala Network L2

Zero-Knowledge Proofs

Combine ZK cryptography with TEE hardware for enhanced security guarantees and simplified proof generation workflows.

Emerging use case in ETHGlobal hackathons

Web2-Web3 Identity

Bridge traditional web accounts with blockchain identities in a secure, verifiable manner. OAuth flows protected by TEE attestation.

Hackathon winner pattern

Verifiable Frontends

Guarantee frontend code integrity and protect users from malicious JavaScript injection. Content-addressed deployments with attestation.

Available in dstack-examples

Example Projects

Ready-to-deploy examples showcasing dstack capabilities

ConfigID-based Attestation

Modern remote attestation verification pattern

Custom Domain

Automatic TLS certificate management via zt-https

SSH over Gateway

Secure shell access through dstack infrastructure

TCP Port Forwarding

Arbitrary TCP port forwarding capabilities

Tor Hidden Service

Run Tor services within TEE environments

Timelock Decryption

NTS-based timelock encryption system

Blockchain Light Client

Verifiable blockchain data access in TEE

Private Docker Registry

Deploy from private registries with credentials

Launcher Pattern

Generic launcher for Docker Compose apps

Webshell

Web-based debugging shell for development

Get Started in Minutes

Deploy your first confidential application with minimal setup

1

Install Dependencies

Set up your TEE-enabled host with required build tools and Rust toolchain (Ubuntu 24.04 recommended).

2

Clone & Build

Clone the dstack repository and build host configuration artifacts. Download or build the guest CVM image.

3

Launch Services

Start the three core services: KMS for key management, Gateway for TLS routing, and VMM for CVM orchestration.

4

Deploy Application

Upload your docker-compose.yaml via the web dashboard. Your app is now running in a secure TEE with automatic attestation.

# Install dependencies (Ubuntu 24.04)
sudo apt install build-essential chrpath diffstat lz4 wireguard-tools xorriso

# Clone dstack
git clone https://github.com/Dstack-TEE/dstack
cd dstack

# Follow the README for detailed setup instructions
# Launch KMS, Gateway, and VMM services
# Access web dashboard and deploy your docker-compose.yaml

# Your application is now running in a secure TEE with:
✓ Remote attestation enabled
✓ Automatic HTTPS with TLS certificates
✓ Encrypted secrets management
✓ Verifiable execution environment

Developer Resources

Everything you need to build with dstack

Documentation

Comprehensive guides, tutorials, and API references

View Documentation →

GitHub

Source code, issues, and pull requests

github.com/dstack-TEE →

Examples

Ready-to-deploy reference implementations

dstack-examples →

Phala Cloud

Managed dstack platform for easy deployment

phala.com →