-
Phala Network API Key
- Sign up at Phala Network
- Go to Dashboard → API Keys
- Create new API key
-
dstack API Key (Optional)
- Visit dstack Documentation
- Follow setup instructions
# Copy example environment file
cp .env.example .env
# Edit with your credentials
nano .envAdd your keys:
PHALA_API_KEY=your-phala-api-key-here
DSTACK_API_KEY=your-dstack-api-key-here./deploy-phala.shYour TEE Trust Validator is now deployed! Access it at:
- Dashboard:
https://<your-app-id>-3000.dstack-pha-prod7.phala.network/ - API:
https://<your-app-id>-8000.dstack-pha-prod7.phala.network/
curl https://<your-app-id>-8000.dstack-pha-prod7.phala.network/api/healthcurl -X POST https://<your-app-id>-8000.dstack-pha-prod7.phala.network/api/attestation/generate \
-H "Content-Type: application/json" \
-d '{"data":"test","nonce":"123"}'- ✅ 11 Working API Endpoints - All fully operational
- ✅ Interactive Dashboard - Beautiful UI for attestation operations
- ✅ Real TEE Integration - Hardware-backed security with Intel TDX
- ✅ Zero Trust Architecture - Continuous verification
- ✅ Production Ready - < 200ms response times
phala cvms logs <your-cvm-id>phala cvms list"Never trust, always verify" - Every component in this system can cryptographically prove its integrity using hardware attestation. This means:
- The code running is exactly what you deployed
- The environment hasn't been tampered with
- All operations are verifiable and auditable
- Hardware-backed security guarantees
| Feature | Description |
|---|---|
| Hardware Attestation | Intel TDX provides cryptographic proof |
| Secure Enclaves | Code runs in isolated TEE environment |
| Continuous Verification | Every request is verified |
| Immutable Audit Trail | All operations are logged and verifiable |
Ready to build trustless applications? Start with the TEE Trust Validator! 🚀