Skip to content

Conversation

@kvinwang
Copy link
Collaborator

No description provided.

h4x3rotab and others added 29 commits January 13, 2026 23:42
Add developer-focused framing that highlights what can be built with
confidential AI without being pitchy. Covers private inference,
training on sensitive data, and trustworthy agents.

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
Add practical verification guide covering:
- Visual verification with proof.t16z.com
- Programmatic verification via guest agent API
- Links to comprehensive docs at docs.phala.network

Reorganize README documentation section by audience:
- For Developers: building apps on dstack
- For Operators: running dstack infrastructure
- Reference: specifications and CLI reference

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
Add FAQ section covering:
- Why not use cloud provider TEEs directly (with comparison table)
- Difference from SGX/Gramine
- Performance overhead
- Production readiness
- Hardware support
- Verification process

Consolidate media kit to single line.

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
Add BibTeX citation for the dstack paper:
"Dstack: A Zero Trust Framework for Confidential Containers"
(arXiv:2509.11555)

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
- Add precedence override for openzeppelin-foundry-upgrades and forge-std
  to handle invalid SPDX expressions in vendored dependencies
- Add missing annotations for kms/auth-simple config files
- Add override for scripts/add-spdx-attribution.py to prevent false
  positive SPDX detection from script content

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
This PR is docs-only; ct_monitor changes were accidentally included.

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
Bumps [hono](https://github.com/honojs/hono) from 4.10.3 to 4.11.4.
- [Release notes](https://github.com/honojs/hono/releases)
- [Commits](honojs/hono@v4.10.3...v4.11.4)

---
updated-dependencies:
- dependency-name: hono
  dependency-version: 4.11.4
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
…uth-simple/hono-4.11.4

build(deps): bump hono from 4.10.3 to 4.11.4 in /kms/auth-simple
Bumps [tracing-subscriber](https://github.com/tokio-rs/tracing) from 0.3.19 to 0.3.20.
- [Release notes](https://github.com/tokio-rs/tracing/releases)
- [Commits](tokio-rs/tracing@tracing-subscriber-0.3.19...tracing-subscriber-0.3.20)

---
updated-dependencies:
- dependency-name: tracing-subscriber
  dependency-version: 0.3.20
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
…criber-0.3.20

build(deps): bump tracing-subscriber from 0.3.19 to 0.3.20
Add the dstack-attest crate with versioned attestations, runtime events, and platform-aware modes (dstack, GCP, Nitro).

Migrate RA-TLS, guest-agent, KMS, verifier, and tdx-attest wiring to the new attestation/eventlog flow with cert embedding and legacy fallback.

Introduce Attest RPC and SDK support; update gateway ACME and cert quoting to emit attestations.

Extend types/configs for TPM key provider and host-share disk label; update system setup and docker compose orphan cleanup.
@kvinwang kvinwang merged commit 425ae9c into master Jan 19, 2026
0 of 4 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants