Attestation verification SDK for confidential computing environments. Verifies Intel TDX, AMD SEV-SNP, and NVIDIA GPU attestation quotes, with end-to-end Secret VM verification that validates CPU attestation, GPU attestation, and the cryptographic bindings between them.
Available as both a Python (PyPI) and Node.js (npm) package.
- Intel TDX — Performs full Intel DCAP quote verification, delegating the cryptographic checks to the upstream
dcap-qvl(Python) /@phala/dcap-qvl(Node) library — the latter is a pure-JS port of the same Phala Network crate the Python package uses, so both packages share verification semantics. Verifies the PCK certificate chain against a pinned Intel SGX Root CA, the TCB Info signature, the QE Identity signature and content (MRSIGNER, ISVPRODID, masked attributes, ISVSVN tier), PCK CRL revocation, the TCB status, the quote signature, the QE report binding, and TD attribute hygiene (debug bit, reserved bits, SEPT_VE_DISABLE). Collateral (TCB Info, QE Identity, CRLs, issuer chains) is fetched from a Provisioning Certificate Caching Service (PCCS) — defaults to SCRT Labs' deployment. - AMD SEV-SNP — Parses a SEV-SNP attestation report, fetches the VCEK certificate from AMD's Key Distribution Service, verifies the ECDSA-P384 report signature, and validates the certificate chain (VCEK → ASK → ARK).
- NVIDIA GPU — Submits GPU attestation evidence to NVIDIA's Remote Attestation Service (NRAS), verifies the returned JWT signatures against NVIDIA's published JWKS keys, and extracts per-GPU attestation claims.
- SecretVM workload — Given a TDX or SEV-SNP quote and a
docker-compose.yaml, determines whether the quote was produced by a known SecretVM image (resolveSecretVmVersion/verifyTdxWorkload/verifySevWorkload). Looks up the quote in a signed registry of official SecretVM builds, then replays the launch measurement to verify the exact compose file that was booted. For VMs that also bake a Dockerfiles archive into the image, both paths accept an optional docker-files digest via--docker-files/--docker-files-sha256: TDX extends RTMR3 with it, SEV-SNP appends it to the kernel cmdline asdocker_additional_files_hash=<hex>(which the launch measurement covers). - Secret VM — End-to-end verification that connects to a VM's attestation endpoints, verifies CPU and GPU attestation, and validates two critical bindings:
- TLS binding: The first 32 bytes of the CPU quote's
report_datamust match the SHA-256 fingerprint of the VM's TLS certificate, proving the quote was generated on the machine serving that certificate. - GPU binding: The second 32 bytes of
report_datamust match the GPU attestation nonce, proving the CPU and GPU attestations are linked.
- TLS binding: The first 32 bytes of the CPU quote's
- Proof of cloud — POSTs a CPU quote to SCRT Labs'
/api/quote-parseendpoint, which confirms the quote originated on a Secret VM and returns itsoriginandmachine_id. Opt-in: passcheck_proof_of_cloud=True/checkProofOfCloud=truetocheck_secret_vm/check_agent/verify_agent(or use--proof-of-cloudon the CLI). Also exposed as a standalonecheck_proof_of_cloud/checkProofOfCloudfunction. - ERC-8004 Agent verification — End-to-end verification of on-chain AI agents registered under the ERC-8004 standard. Resolves agent metadata from any supported blockchain (Ethereum, Base, Arbitrum, Polygon, and 14 more), discovers the agent's TEE attestation endpoints, and runs the full verification flow (TLS binding, CPU attestation, GPU attestation, and workload verification). Three composable functions:
resolveAgent— Queries the on-chain registry contract for the agent's metadata (tokenURI -> services, supportedTrust).verifyAgent— Takes agent metadata and runs full TEE verification against the agent's declared endpoints.checkAgent— End-to-end: resolves the agent on-chain, then verifies it. One call does everything.
pip install secretvm-verifynpm install secretvm-verifyThe simplest way to verify a VM — handles CPU detection, GPU detection, and all binding checks automatically.
Python:
from secretvm.verify import check_secret_vm
result = check_secret_vm("my-vm.example.com")
print(result.valid) # True if all checks pass
print(result.attestation_type) # "SECRET-VM"
print(result.checks) # {"cpu_quote_fetched": True, "tls_cert_fetched": True, ...}
print(result.report) # {"tls_fingerprint": "...", "cpu": {...}, "cpu_type": "TDX", ...}
print(result.errors) # [] if no errorsNode.js / TypeScript:
import { checkSecretVm } from 'secretvm-verify';
const result = await checkSecretVm('my-vm.example.com');
console.log(result.valid); // true if all checks pass
console.log(result.attestationType); // "SECRET-VM"
console.log(result.checks); // { cpu_quote_fetched: true, tls_cert_fetched: true, ... }
console.log(result.report); // { tls_fingerprint: "...", cpu: {...}, cpu_type: "TDX", ... }
console.log(result.errors); // [] if no errorsVerify an AI agent registered on-chain using the ERC-8004 standard. Supports 18 chains including Ethereum, Base, Arbitrum, and more.
import { checkAgent } from 'secretvm-verify';
// End-to-end: resolve on-chain + verify TEE attestation
const result = await checkAgent(38114, 'base');
console.log(result.valid); // true if all checks pass
console.log(result.attestationType); // "ERC-8004"
console.log(result.checks); // { agent_resolved: true, metadata_valid: true, ... }You can also work with the individual steps:
import { resolveAgent, verifyAgent } from 'secretvm-verify';
// Step 1: Resolve agent metadata from the blockchain
const metadata = await resolveAgent(38114, 'base');
console.log(metadata.name); // Agent name
console.log(metadata.services); // [{ name: "teequote", endpoint: "..." }, ...]
console.log(metadata.supportedTrust); // ["tee-attestation"]
// Step 2: Verify the agent's TEE attestation
const result = await verifyAgent(metadata);RPC configuration (required): Set SECRETVM_RPC_BASE (or SECRETVM_RPC_<CHAIN>) environment variable with your RPC endpoint. No default RPCs are included — an error is thrown if no RPC is configured.
Given a TDX quote, determine which official SecretVM template and version produced it:
Python:
from secretvm.verify import resolve_secretvm_version
result = resolve_secretvm_version(open("cpu_quote.txt").read())
if result:
print(result["template_name"]) # e.g. "small"
print(result["artifacts_ver"]) # e.g. "v0.0.25"
else:
print("Not a known SecretVM")Node.js / TypeScript:
import { resolveSecretVmVersion } from 'secretvm-verify';
import { readFileSync } from 'fs';
const result = resolveSecretVmVersion(readFileSync('cpu_quote.txt', 'utf8'));
if (result) {
console.log(result.template_name); // e.g. "small"
console.log(result.artifacts_ver); // e.g. "v0.0.25"
} else {
console.log('Not a known SecretVM');
}Verify that a TDX quote was produced by a known SecretVM and that it was running a specific docker-compose.yaml:
Python:
from secretvm.verify import verify_workload, format_workload_result
# Auto-detects TDX vs SEV-SNP:
result = verify_workload(
open("cpu_quote.txt").read(),
open("docker-compose.yaml").read(),
)
print(result.status) # "authentic_match" | "authentic_mismatch" | "not_authentic"
print(result.template_name) # e.g. "small" (None when not_authentic)
print(result.artifacts_ver) # e.g. "v0.0.25" (None when not_authentic)
print(result.env) # e.g. "prod" (None when not_authentic)
print(format_workload_result(result)) # human-readable summaryIf you know the quote type, you can call verify_tdx_workload directly (same signature).
Node.js / TypeScript:
import { verifyWorkload, formatWorkloadResult } from 'secretvm-verify';
import { readFileSync } from 'fs';
// Auto-detects TDX vs SEV-SNP:
const result = verifyWorkload(
readFileSync('cpu_quote.txt', 'utf8'),
readFileSync('docker-compose.yaml', 'utf8'),
);
console.log(result.status); // "authentic_match" | "authentic_mismatch" | "not_authentic"
console.log(result.template_name); // e.g. "small" (undefined when not_authentic)
console.log(result.artifacts_ver); // e.g. "v0.0.25" (undefined when not_authentic)
console.log(result.env); // e.g. "prod" (undefined when not_authentic)
console.log(formatWorkloadResult(result)); // human-readable summaryIf you know the quote type, you can call verifyTdxWorkload directly (same signature).
Status values:
| Status | Meaning |
|---|---|
authentic_match |
Quote is from a known SecretVM and the compose file matches exactly |
authentic_mismatch |
Quote is from a known SecretVM but the compose file does not match |
not_authentic |
Quote's MRTD/RTMR values are not in the SecretVM registry |
All verification functions accept either raw quote data or a VM URL. When a URL is passed, the quote is automatically fetched from the VM's attestation endpoint.
Python:
from secretvm.verify import check_cpu_attestation
# From a file:
result = check_cpu_attestation(open("cpu_quote.txt").read())
# Or directly from a VM URL:
result = check_cpu_attestation("blue-moose.vm.scrtlabs.com")
print(result.attestation_type) # "TDX" or "SEV-SNP"
print(result.valid)Node.js:
import { checkCpuAttestation } from 'secretvm-verify';
import { readFileSync } from 'fs';
// From a file:
const result = await checkCpuAttestation(readFileSync('cpu_quote.txt', 'utf8'));
// Or directly from a VM URL:
const result = await checkCpuAttestation('blue-moose.vm.scrtlabs.com');
console.log(result.attestationType); // "TDX" or "SEV-SNP"
console.log(result.valid);This works with all functions: checkTdxCpuAttestation, checkSevCpuAttestation, checkNvidiaGpuAttestation, verifyWorkload, resolveSecretVmVersion, and their Python equivalents. When a URL is passed to verifyWorkload, both the quote and docker-compose are fetched automatically.
All functions return an AttestationResult with these fields:
| Field | Type | Description |
|---|---|---|
valid |
bool / boolean |
Overall pass/fail |
attestation_type / attestationType |
str / string |
"TDX", "SEV-SNP", "NVIDIA-GPU", or "SECRET-VM" |
checks |
dict / Record<string, boolean> |
Individual verification steps |
report |
dict / Record<string, any> |
Parsed attestation fields |
errors |
list / string[] |
Error messages for failed checks |
End-to-end Secret VM verification. Connects to <url>:29343, fetches CPU and GPU quotes, verifies both, and checks TLS and GPU bindings.
Parameters:
url— VM address (e.g.,"my-vm.example.com","https://my-vm:29343")product— AMD product name ("Genoa","Milan","Turin"). Only needed for SEV-SNP, auto-detected if omitted.
Checks performed:
| Check | Description |
|---|---|
cpu_quote_fetched |
CPU quote fetched from /cpu endpoint |
tls_cert_fetched |
TLS certificate retrieved from the VM |
cpu_quote_verified |
CPU attestation signature chain verified |
tls_binding_verified |
report_data first half matches TLS cert fingerprint |
gpu_quote_fetched |
GPU quote fetched from /gpu endpoint (false if no GPU) |
gpu_quote_verified |
GPU attestation verified via NVIDIA NRAS (only if GPU present) |
gpu_binding_verified |
report_data second half matches GPU nonce (only if GPU present) |
workload_fetched |
docker-compose fetched from /docker-compose endpoint |
workload_binding_verified |
Workload (docker-compose hash) matches the attested one |
proof_of_cloud_verified |
SCRT Labs' quote-parse endpoint confirms the VM is a Secret VM |
Auto-detects Intel TDX vs AMD SEV-SNP and delegates to the appropriate function.
Parameters:
data— Raw quote text (hex-encoded for TDX, base64-encoded for SEV-SNP)product— AMD product name (only used for SEV-SNP)
Verifies an Intel TDX Quote v4.
Parameters:
data— Hex-encoded TDX quote
Report fields include: version, mr_td, mr_seam, rt_mr0–rt_mr3, report_data, fmspc, tcb_status
Verifies an AMD SEV-SNP attestation report.
Parameters:
data— Base64-encoded SEV-SNP reportproduct—"Genoa","Milan", or"Turin". Auto-detected if omitted.
Report fields include: version, measurement, report_data, chip_id, vmpl, policy, debug_allowed, product
Verifies a raw CPU quote against SCRT Labs' /api/quote-parse endpoint. The service parses the quote, confirms it was produced by a Secret VM, and returns the VM's origin and machine_id.
Parameters:
quote— Raw CPU quote text as served by the VM's/cpuendpoint.
Checks performed: proof_of_cloud_verified (HTTP 200 and body contains proof_of_cloud: true).
Report fields: origin, proof_of_cloud, status ({attestation_type, result, exp_status}), machine_id.
Also runs automatically as part of check_secret_vm and is spliced into the CLI output for --cpu, --tdx, and --sev as the proof_of_cloud_verified check.
Looks up a TDX quote in the SecretVM artifact registry. Returns the matching template name and version, or None / null if the quote does not match any known SecretVM build.
Parameters:
data— Hex-encoded TDX quote
Returns: { template_name, artifacts_ver } or None / null
Verifies that a TDX quote was produced by a known SecretVM running a specific docker-compose.yaml. Replays the RTMR3 measurement from the compose content and compares it to the value in the quote.
Parameters:
data— Hex-encoded TDX quotedocker_compose_yaml/dockerComposeYaml— Contents of thedocker-compose.yamlfile
Returns: WorkloadResult
Verifies that an AMD SEV-SNP report was produced by a known SecretVM running a specific docker-compose.yaml. Recomputes the SEV-SNP GCTX launch digest from the registry entry matching the report's family_id/image_id and the provided compose content, then compares it against the measurement in the report.
Generic workload verifier that auto-detects the quote type and delegates to the appropriate lower-level function:
- TDX (hex) →
verify_tdx_workload/verifyTdxWorkload - SEV-SNP (base64) →
verify_sev_workload/verifySevWorkload - Unknown → returns
not_authentic
Parameters:
data— Hex-encoded TDX quote or base64-encoded SEV-SNP reportdocker_compose_yaml/dockerComposeYaml— Contents of thedocker-compose.yamlfile
Returns: WorkloadResult
Formats a WorkloadResult as a short, human-readable string with status emoji.
Example output:
✅ Confirmed an authentic SecretVM (TDX), vm_type small, artifacts v0.0.25, environment prod
✅ Confirmed that the VM is running the specified docker-compose.yaml
✅ Confirmed an authentic SecretVM (TDX), vm_type small, artifacts v0.0.25, environment prod
🚫 Attestation does not match the specified docker-compose.yaml
🚫 Attestation doesn't belong to an authentic SecretVM
Python dataclass / TypeScript interface returned by workload functions:
| Field | Type | Description |
|---|---|---|
status |
WorkloadStatus |
"authentic_match", "authentic_mismatch", or "not_authentic" |
template_name |
str | None / string | undefined |
SecretVM template (e.g. "small"), set when status ≠ not_authentic |
artifacts_ver |
str | None / string | undefined |
Artifacts version (e.g. "v0.0.25"), set when status ≠ not_authentic |
env |
str | None / string | undefined |
Environment (e.g. "prod"), set when status ≠ not_authentic |
Verifies NVIDIA GPU attestation via NRAS.
Parameters:
data— JSON attestation payload
Report fields include: overall_result, gpus (per-GPU model, driver version, secure boot status, measurement results)
Install globally:
npm install -g secretvm-verifyOr from the repo:
cd node
npm install && npm run build
npm install -g .Then use from anywhere:
# Verify a Secret VM (CPU + GPU + TLS binding)
secretvm-verify --secretvm yellow-krill.vm.scrtlabs.com
# Verify individual attestation quotes from files
secretvm-verify --tdx cpu_quote.txt
secretvm-verify --sev amd_cpu_quote.txt --product Genoa
secretvm-verify --gpu gpu_attest.txt
# Auto-detect CPU quote type (TDX vs SEV-SNP)
secretvm-verify --cpu cpu_quote.txt
# Resolve which SecretVM version produced a TDX quote
secretvm-verify --resolve-version cpu_quote.txt
# → Template: small, Version: v0.0.25
# Verify a TDX quote + docker-compose match
secretvm-verify --verify-workload cpu_quote.txt --compose docker-compose.yaml
# Same, plus a Dockerfiles archive digest (TDX VMs that bake docker-files into the image).
# Pass --docker-files <path> to let the CLI hash the archive, or --docker-files-sha256 <hex>
# if you already have the digest.
secretvm-verify --verify-workload cpu_quote.txt --compose docker-compose.yaml --docker-files docker-files.tar
secretvm-verify --verify-workload cpu_quote.txt --compose docker-compose.yaml --docker-files-sha256 <hex>
# → ✅ Confirmed an authentic SecretVM (TDX), vm_type small, artifacts v0.0.25, environment prod
# → ✅ Confirmed that the VM is running the specified docker-compose.yaml
# Verify an ERC-8004 agent on-chain (requires RPC)
SECRETVM_RPC_BASE="https://..." secretvm-verify --check-agent 38114 --chain base
secretvm-verify --check-agent 38114 --chain base -v
# Verify an agent from a metadata JSON file
secretvm-verify --agent metadata.json
# Show the actual workload (docker-compose.yaml) after verification
secretvm-verify --secretvm yellow-krill.vm.scrtlabs.com --show-compose
# Just print the docker-compose from a VM (no verification, pipeable)
secretvm-verify --compose --vm yellow-krill.vm.scrtlabs.com > compose.yaml
secretvm-verify --compose docker-compose.yaml # or from a local file
# JSON output (any command)
secretvm-verify --secretvm yellow-krill.vm.scrtlabs.com --json # minimal JSON
secretvm-verify --secretvm yellow-krill.vm.scrtlabs.com --raw # full JSON with parsed report
# A bare URL defaults to --secretvm
secretvm-verify yellow-krill.vm.scrtlabs.comFull usage:
Usage: secretvm-verify <command> <value> [--product NAME] [--json|--raw] [--verbose|-v]
Commands:
--secretvm <url> Verify a Secret VM (CPU + GPU + TLS binding)
--cpu <file|--vm url> Verify a CPU quote (auto-detect TDX vs SEV-SNP)
--tdx <file|--vm url> Verify an Intel TDX quote
--sev <file|--vm url> Verify an AMD SEV-SNP report
--gpu <file|--vm url> Verify an NVIDIA GPU attestation
--resolve-version, -rv <file|--vm url>
Resolve SecretVM version from TDX or AMD SEV-SNP quote
--verify-workload, -vw <file|--vm url> [--compose <file>] [--docker-files <tar> | --docker-files-sha256 <hex>]
Verify workload against a docker-compose (fetched from VM if --vm)
--check-agent <id> --chain <name>
Resolve and verify an ERC-8004 agent on-chain
--agent <file> Verify an ERC-8004 agent from a metadata JSON file
--compose <file|--vm url> Fetch (from a VM or a file) and print the docker-compose
to stdout. No verification. Useful for piping.
Options:
--vm <url> Fetch quote from a VM instead of a file
--chain NAME Chain name for --check-agent (e.g. base, ethereum, arbitrum)
--product NAME AMD product name (Genoa, Milan, Turin)
--json Output minimal JSON (valid, checks, errors) — omits parsed report fields
--raw Output full JSON result (includes the parsed report fields)
--verbose, -v Print parsed CPU/GPU/proof-of-cloud quotes as JSON (text mode only)
--reload-amd-kds Bypass the local AMD KDS cache and re-fetch VCEK,
cert chain, and CRL from kdsintf.amd.com (no effect on TDX)
--proof-of-cloud Also ask SCRT Labs' quote-parse endpoint to confirm the
quote originated on a Secret VM (opt-in; off by default)
--show-compose Print the docker-compose.yaml that was verified after the
check list (works with --secretvm, --verify-workload,
--check-agent, --agent)
cd python
pip install -e .
python check_vm.py https://my-vm:29343
python check_vm.py https://my-vm:29343 --json # minimal JSON
python check_vm.py https://my-vm:29343 --raw # full JSON with parsed report
python check_vm.py https://my-vm:29343 --product GenoaThe library contacts these services during verification:
| Service | Used by | Purpose |
|---|---|---|
| SCRT PCCS | TDX | DCAP collateral (TCB Info, QE Identity, PCK CRL, Root CA CRL, issuer chains). Override with SECRETVM_PCCS_URL (e.g. https://api.trustedservices.intel.com for Intel's PCS, or your own deployment). |
| SCRT Labs quote-parse | Secret VM, --cpu/--tdx/--sev, agent |
Proof-of-cloud verdict (confirms quote originated on a Secret VM) |
| AMD KDS | SEV-SNP | VCEK certificate, AMD CA cert chain (ASK + ARK), CRL |
| NVIDIA NRAS | GPU | GPU attestation verification |
To minimize calls to kdsintf.amd.com (which is rate-limited and returns HTTP 429 under load) the AMD SEV-SNP verifier caches all three KDS responses to disk. The cache is on by default; nothing to enable.
| Item | TTL | Cache key |
|---|---|---|
| VCEK certificate | 30 days | (product, chip_id, ucode_SPL, snp_SPL, tee_SPL, bl_SPL) — full TCB tuple |
| AMD CA cert chain (ASK + ARK) | 30 days | product |
| CRL | from the CRL's own X.509 nextUpdate field (typically ~7 months for AMD); falls back to 7 days if nextUpdate is missing or unparseable |
product |
The VCEK cache key includes the full TCB tuple because AMD issues a distinct VCEK per (chip, TCB version). A microcode update on the same chip becomes a cache miss with the new key, fetching the updated VCEK as expected.
Cache location. Default ~/.cache/secretvm-verify/amd/. Override with the SECRETVM_VERIFY_CACHE_DIR environment variable; the library appends /amd to whatever you set:
export SECRETVM_VERIFY_CACHE_DIR=/var/cache/myapp
# → entries land in /var/cache/myapp/amd/{vcek,cert_chain,crl}/Each cached entry is two files: the payload (DER bytes for VCEK and CRL, PEM text for the cert chain) and a sidecar <name>.expires containing the Unix-epoch expiration time. Both Python and Node share the same on-disk format, so the two languages can use the same cache directory if desired.
Inspect cached entries:
ls -lR ~/.cache/secretvm-verify/amd/
# Decode a specific VCEK
openssl x509 -in ~/.cache/secretvm-verify/amd/vcek/<file> -inform DER -text -noout
# Decode the CRL — see revoked serials and nextUpdate
openssl crl -in ~/.cache/secretvm-verify/amd/crl/Genoa -inform DER -text -nooutNetwork failure fallback. If AMD KDS is unreachable or returns an error, the cache falls back to a stale entry rather than failing the verification. Better to verify with a slightly old CRL than to fail every SEV-SNP attestation while KDS is down. Only when both the cache and the network come up empty does the verification surface an error.
Strict mode (--strict on the CLI, strict=True in the SDK) disables this fallback. In strict mode, a failed live fetch is not rescued by a stale cached entry — the verification fails closed. Use this when freshness matters more than availability (e.g. enforcing CRL freshness so a recently revoked VCEK can't slip through).
Force a refresh (skip the cache for this call, fetch fresh, write back to cache):
CLI:
secretvm-verify --secretvm <url> --reload-amd-kds
secretvm-verify --sev <quote.txt> --product Genoa --reload-amd-kds
python check_vm.py <url> --reload-amd-kdsPython:
result = check_sev_cpu_attestation(quote, product="Genoa", reload_amd_kds=True)
result = check_secret_vm(url, reload_amd_kds=True)
result = check_cpu_attestation(quote, product="Genoa", reload_amd_kds=True)
result = check_agent(agent_id, "base", reload_amd_kds=True)Node:
const result = await checkSevCpuAttestation(quote, "Genoa", true);
const result = await checkSecretVm(url, "", true);
const result = await checkCpuAttestation(quote, "Genoa", true);
const result = await checkAgent(agentId, "base", true);The --reload-amd-kds flag has no effect on Intel TDX verification (TDX doesn't cache; the upstream dcap-qvl / @phala/dcap-qvl libraries manage their own ephemeral state).
To clear the cache entirely:
rm -rf ~/.cache/secretvm-verify/amdsecretvm-verify/
python/ # PyPI package
pyproject.toml
src/secretvm/verify/
__init__.py # All library code
tests/
test_attestation.py # 49 tests (integration + mocked; includes workload tests)
check_vm.py # CLI tool
node/ # npm package
package.json
tsconfig.json
src/
index.ts # Public exports
types.ts # AttestationResult interface
tdx.ts # Intel TDX verification
amd.ts # AMD SEV-SNP verification
nvidia.ts # NVIDIA GPU verification
cpu.ts # Auto-detect TDX vs SEV-SNP
vm.ts # End-to-end Secret VM verification
workload.ts # resolveSecretVmVersion + verifyTdxWorkload
artifacts.ts # SecretVM artifact registry loader
rtmr.ts # RTMR3 replay from docker-compose
cli.ts # CLI tool
workload.test.ts # Tests for workload / version resolution
test-data/ # Shared attestation quote fixtures
cpu_quote.txt # Intel TDX quote (hex)
amd_cpu_quote.txt # AMD SEV-SNP report (base64)
gpu_attest.txt # NVIDIA GPU attestation (JSON)
tdx_cpu_docker_check_quote.txt # TDX quote from a SecretVM with docker-compose
tdx_cpu_docker_check_compose.yaml # Matching docker-compose.yaml for the quote above
- Python: >= 3.10. Dependencies:
requests,cryptography,PyYAML,web3,dcap-qvl(TDX quote verification). - Node.js: >= 18 (uses built-in
crypto,fetch). Dependencies:@phala/dcap-qvl(TDX quote verification + AMD CRL parsing),asn1js(parses the CRL'snextUpdatefield for cache TTL),ethers(ERC-8004 agent resolution).
No system-level dependencies. AMD SEV-SNP certificate chains (RSA-PSS) are verified natively via cryptography (Python) and node:crypto (Node).
MIT