Skip to content
@devopsdefender

devopsdefender

DevOps Defender

Run confidential workloads on hardware-encrypted VMs. Owner-scoped, attested, and wired to the public internet with one call.

DevOps Defender is an open-source platform for running AI and other workloads inside Intel TDX enclaves. Each agent lives in a hardware-encrypted VM, speaks back to a control plane through an outbound-only Cloudflare tunnel, and exposes any port a workload needs at <label>.<agent-hostname> — ingress is provisioned dynamically as workloads come and go.

How it works

Layer Technology What it does
Trust root Intel TDX + Intel Trust Authority CPU-signed attestation quote on every register + /health poll; the CP drops agents whose ITA token fails.
Transport Cloudflare Tunnels (outbound-only) No open ports, no TLS certs, no firewall rules. Per-workload ingress rules are added to the tunnel at runtime.
Auth GitHub OAuth (fleet) / shared PAT (individual agents) Owner-scoped: a PAT belonging to the agent's DD_OWNER org can deploy, view, and mop any agent in the fleet.
Workloads Raw processes or podman containers via easyenclave Spawned from a tiny JSON DeployRequest — no OCI registry assumed, github-release assets work too.

Lifecycle

  1. Boot. The agent starts as a workload under easyenclave inside a TDX VM, mints an ITA attestation token, and POSTs it to the control plane at $DD_CP_URL/register. On success it gets a Cloudflare tunnel token and a JWT signing secret.
  2. Attest. Every /health poll carries a fresh ITA-signed JWT. The CP re-verifies each token and drops agents whose attestation has expired, been revoked, or drifted.
  3. Connect. Cloudflared comes up outbound-only; the agent is reachable at <tunnel-name>.devopsdefender.com. Workloads that declare expose: {hostname_label, port} get a public hostname <label>.<tunnel-name>.devopsdefender.com routed to localhost:<port> — added at register time for boot workloads, at /deploy time for runtime workloads.
  4. Run. POST JSON specs to /deploy on the agent. Status, logs, and a live web terminal are on the dashboard at the agent's hostname. Owner-scoped GitHub PAT is all the auth you need.

Repositories

Repo Description
dd The devopsdefender Rust binary. One crate, two modes (DD_MODE=management for the control plane; DD_MODE=agent for VMs). Ships the fleet dashboard, the /register + /deploy + /ingress/replace API, the ITA verifier, and the Cloudflare tunnel CRUD.

Ecosystem

  • easyenclave — the bare runtime that hosts dd-agent (and anything else) inside a TDX VM: unix-socket workload API, PID 1, no networking, no HTTP.
  • slopandmop — catalog of reference workloads you can compose and deploy onto a DD agent. The home of the ollama + openclaw LLM stack that used to live in this repo's apps/.

Links

Popular repositories Loading

  1. dd dd Public

    DevOps Defender - Confidential Computing Platform

    Rust 2 1

  2. .github .github Public

    DevOps Defender org profile and documentation

  3. marketplace marketplace Public

    Compute marketplace on DD + OpenClaw — buy TDX enclave capacity with BTC, manage local GPU nodes

    Shell

  4. bastion bastion Public archive

    Block-aware web terminal: persistent shells, OSC 133 segmentation, xterm.js front-end. Embeddable axum crate + standalone binary.

    Rust

  5. bastion-app bastion-app Public

    Block-aware unified terminal client — CLI + desktop. Connects to DD enclaves, SSH hosts, Anthropic, GitHub from one device-owned sidebar.

    Rust

  6. devopsdefender.com devopsdefender.com Public

    devopsdefender.com — public website

    HTML

Repositories

Showing 6 of 6 repositories

Top languages

Loading…

Most used topics

Loading…