What EasyEnclave replaces
EasyEnclave is a Linux distribution replacement for confidential VMs: one Rust PID 1, a small Unix socket API, no systemd, no package manager, and no runtime network stack in the enclave supervisor.
Intel TDX · EasyEnclave · GitHub OIDC · Noise
DevOpsDefender runs protocol oracles, keepers, co-signers, settlement bots, and confidential coding agents inside measured TDX VMs. The public API exposes enough evidence for an external verifier to bind code, config, runtime state, and the agent Noise key before trusting a result.
{
"confidential_mode": true,
"taint_reasons": [
"customer_workload_deployed"
],
"noise": {
"quote_b64": "tdx_quote...",
"pubkey_hex": "8f0b...a91e"
},
"deployments": ["btc-usd-oracle"]
}
External verification
/health returns the TDX quote, Noise public key, workload list, mode, and taint reasons.
Intel Trust Authority or an equivalent verifier checks the quote signature and measured boot.
The quote report data commits to the agent Noise key, preventing a clean quote from authenticating another endpoint.
# Evidence is public. No CF Access, no operator session. curl -fsSL https://<agent>.devopsdefender.com/health \ | jq '{confidential_mode, taint_reasons, noise}' # Sealed oracle expectation: # confidential_mode == true # taint_reasons == ["customer_workload_deployed"]
Runtime substrate
EasyEnclave is a Linux distribution replacement for confidential VMs: one Rust PID 1, a small Unix socket API, no systemd, no package manager, and no runtime network stack in the enclave supervisor.
DevOpsDefender layers fleet registration, Cloudflare tunnel routing, GitHub OIDC authorization, Intel attestation refresh, workload logs, and shell access controls on top of that measured base.
Workload model
Workloads are JSON specs, not mutable servers. A crypto oracle can be pinned to a GitHub release asset and a commit-level workload spec, then deployed into confidential mode where mutation routes are absent.
{
"app_name": "btc-usd-oracle",
"github_release": {
"repo": "example/proof-oracle",
"asset": "oracle-linux-amd64",
"rename": "oracle"
},
"cmd": ["/var/lib/easyenclave/bin/oracle"],
"expose": { "hostname_label": "oracle", "port": 8080 }
}
Publish signed prices, reserves, attestations, or proof status from code whose deployment state is externally checkable.
Run liquidation, settlement, rebalance, or bridge-monitoring jobs with public health and operator-taint evidence.
Run Codex, Claude, or custom bots with encrypted terminal history and reconnectable sessions when read-write access is intended.
Operational access
Oracle observers can view workload logs through the xterm interface without stdin, resize, close, or signal controls. This is for protocols where visibility is useful and interference is not.
Operator shells and confidential coding agents get real PTYs, reconnectable sessions, encrypted transcript history, and WezTerm-style notification escape support.
# Long-running agent can notify the browser or mobile web shell. printf '\033]777;notify;%s;%s\033\\' \ 'keeper' 'settlement window open'
Trust model
| State | Verifier meaning |
|---|---|
[] |
Pristine boot. No customer deploy, owner reassignment, arbitrary exec, or shell access has occurred. |
customer_workload_deployed |
Expected sealed-oracle state after the workload is installed. Mutation routes should still be absent. |
arbitrary_exec_enabled |
The node booted with deploy/exec surfaces available. Useful for operators, not a sealed oracle. |
interactive_shell_enabled |
Read-write shell access is enabled. Treat as operator-interactive infrastructure. |
The source is open, the runtime is measured, and the public health surface is designed for machines, not screenshots.