README
Background tasks that live inside a Trust Domain. Composable, attestation-first, and built to scale — from prototype agents to the most regulated consumer and enterprise workloads on the planet.
npx trigger.dev@latest init --enclave intel-tdxFeatures
Hardware Trust Domain.
Intel TDX, AMD SEV-SNP, NVIDIA H100-CC, AWS Nitro — pin one or let us pick.
Sealed payloads.
X25519 + AES-GCM in flight, Trust Domain memory at rest. Operator reads ciphertext.
Remote attestation.
Every run produces a DCAP-signed quote you can verify from your laptop.
Confidential models.
Run GPT-4o, Claude, Llama, Mistral — weights and prompts never leave the TD.
Reproducible runtime.
Pin MR_TD measurements; reject any image you didn't approve.
MR_TD = 9f3a:c1b8:e7d2:6a04:1b56:af03Multi-region.
us-east, eu-fra, ap-tok, with in-region attestation roots and key custody.
Zero-trust egress.
Per-task allowlists; calls leave the TD only to attested counterparties.
Auditable by design.
Every quote, every input hash, every model version — append-only ledger.
Two lines of code.
Same task() primitive your team knows. Add `enclave` and `attestation`.
task({ enclave: "intel-tdx" })Framework
The same task() primitive your team already uses. Pin a TEE, demand attestation, the platform handles the rest.
import { task, attest } from "@trigger.dev/sdk" export const summarizeFiling = task({ id: "summarize-filing", enclave: "intel-tdx", // hardware TEE attestation: "required", // signed quote per run model: "claude-opus-4-7", run: async ({ payload, ai }) => { const result = await ai.complete(payload.text); return attest(result); // signed by TD measurement },});ZERO READS
Operators cannot read payloads, prompts, or model output. Period.
Live ops
Every agent task lands inside a Trust Domain, runs sealed, and exits with a quote.
- run_------------ · ----TDX------OK0
- run_------------ · ----TDX------OK0
- run_------------ · ----TDX------OK0
- run_------------ · ----TDX------OK0
- run_------------ · ----TDX------OK0
- run_------------ · ----TDX------OK0
- 01CLIENTTrigger SDK
- 02ENCRYPTX25519 + AES-GCM
- 03TRUST DOMAINIntel TDX TD0
- 04AGENTSealed model run
- 05ATTESTDCAP quote
- 06VERIFYCaller-side check
across 4 TEE families
DCAP-rooted quotes
by design — sealed memory
vs unsealed baseline
Run agents on whichever TEE your workload demands. We attest, you verify, no one else reads.
Roll your own confidential agent platform in minutes.