Deploy Confidential Applications in Minutes
The open-source, developer-friendly TEE SDK for secure, attestable computing
Transitioning to Linux FoundationConvert any Docker container into a secure, verifiable application running in Trusted Execution Environments. No code changes required.
What is dstack?
A security-first SDK that simplifies deploying containerized applications into Trusted Execution Environments
Developer-Friendly TEE Deployment
dstack enables you to deploy Docker containers to secure, hardware-isolated environments with minimal configuration changes. Using familiar tools like docker-compose.yaml, you can have confidential applications running in production in minutes.
Built by a passionate open-source community, dstack provides production-ready security with full transparency and vendor independence through hardware-level trusted execution environments.
Key Benefits
✓ Zero Code Changes: Deploy existing Docker containers as-is
✓ Hardware-Level Security: TEE isolation protects data in use
✓ Remote Attestation: Cryptographically verify application integrity
✓ Vendor Independence: Decentralized trust model, no lock-in
Architecture Components
- dstack-vmm - Manages Confidential VMs on TEE hosts
- dstack-gateway - Reverse proxy for TLS connections
- dstack-kms - Decentralized key management
- dstack-guest-agent - In-CVM attestation service
- meta-dstack - Yocto layer for guest images
Why Choose dstack?
Production-ready features designed for developers who care about security
Docker Native
Use familiar Docker Compose workflows. No proprietary tooling or steep learning curves.
Zero-Trust HTTPS
Automatic TLS termination with RA-HTTPS wrapping and certificate management built-in.
Secret Management
Client-side encrypted environment variables, decrypted securely within the TEE.
Remote Attestation
Cryptographic proof of execution environment with chain-of-trust visualization.
Decentralized KMS
Hardware-independent key derivation eliminates vendor lock-in and single points of failure.
Web Dashboard
Intuitive interface for deployment, monitoring, and log management via REST API.
Real-World Applications
Production deployments powering the next generation of secure applications
AI Agents & Inference
Run private AI agents and LLMs with full confidentiality. Process sensitive data without exposing it to cloud providers or infrastructure operators.
Used by: ai16z (Eliza), 0G, Morpheus, Lumerin
Programmable Privacy
Build privacy-preserving protocols and applications with custom TEE logic. Deploy Docker containers as privacy co-processors for existing blockchains.
Used by: Encifher
Blockchain Infrastructure
Secure cross-chain bridges, verifiable oracles, and confidential smart contracts. First Op-Succinct Layer 2 on Ethereum built with dstack.
Used by: Phala Network L2
Zero-Knowledge Proofs
Combine ZK cryptography with TEE hardware for enhanced security guarantees and simplified proof generation workflows.
Emerging use case in ETHGlobal hackathons
Web2-Web3 Identity
Bridge traditional web accounts with blockchain identities in a secure, verifiable manner. OAuth flows protected by TEE attestation.
Hackathon winner pattern
Verifiable Frontends
Guarantee frontend code integrity and protect users from malicious JavaScript injection. Content-addressed deployments with attestation.
Available in dstack-examples
Example Projects
Ready-to-deploy examples showcasing dstack capabilities
ConfigID-based Attestation
Modern remote attestation verification pattern
Custom Domain
Automatic TLS certificate management via zt-https
SSH over Gateway
Secure shell access through dstack infrastructure
TCP Port Forwarding
Arbitrary TCP port forwarding capabilities
Tor Hidden Service
Run Tor services within TEE environments
Timelock Decryption
NTS-based timelock encryption system
Blockchain Light Client
Verifiable blockchain data access in TEE
Private Docker Registry
Deploy from private registries with credentials
Launcher Pattern
Generic launcher for Docker Compose apps
Webshell
Web-based debugging shell for development
Get Started in Minutes
Deploy your first confidential application with minimal setup
Install Dependencies
Set up your TEE-enabled host with required build tools and Rust toolchain (Ubuntu 24.04 recommended).
Clone & Build
Clone the dstack repository and build host configuration artifacts. Download or build the guest CVM image.
Launch Services
Start the three core services: KMS for key management, Gateway for TLS routing, and VMM for CVM orchestration.
Deploy Application
Upload your docker-compose.yaml via the web dashboard. Your app is now running in a secure TEE with automatic attestation.
# Install dependencies (Ubuntu 24.04)
sudo apt install build-essential chrpath diffstat lz4 wireguard-tools xorriso
# Clone dstack
git clone https://github.com/Dstack-TEE/dstack
cd dstack
# Follow the README for detailed setup instructions
# Launch KMS, Gateway, and VMM services
# Access web dashboard and deploy your docker-compose.yaml
# Your application is now running in a secure TEE with:
✓ Remote attestation enabled
✓ Automatic HTTPS with TLS certificates
✓ Encrypted secrets management
✓ Verifiable execution environment Ecosystem & Community
Built by a thriving open-source community with diverse contributors
Linux Foundation
Transitioning to neutral governance for community-driven open-source development
Phala Network
Lead contributor and operator of Phala Cloud, the managed dstack platform
Flashbots
Strategic collaboration on MEV protection and confidential computing research
ai16z
Eliza AI agent framework built on dstack TEE infrastructure
Open Source
Apache 2.0 licensed with 310+ GitHub stars and active community contributions
Developer Resources
Everything you need to build with dstack