What is attestation? It’s a way to verify — not trust — that the right code is running on genuine hardware in a secure configuration. The hardware itself signs a report that you can check independently. Think of it as a tamper-proof audit certificate, issued by the chip manufacturer, that you can validate in real time.
What Ships Today
PCCI ships with CPU and GPU attestation from day one. Both are available, independently verifiable, and both are verified directly in your browser — no server round-trip, no intermediary you need to trust.| Type | Hardware | Status | What It Proves |
|---|---|---|---|
| CPU | AMD SEV-SNP | Available | The enclave is running measured code on genuine AMD hardware with encrypted memory |
| CPU | Intel TDX | Available | The enclave is running measured code on genuine Intel hardware with Trust Domain isolation |
| GPU | NVIDIA Hopper & Blackwell | Available | The GPU is in confidential mode on genuine NVIDIA hardware with encrypted memory |
How Attestation Works — The Big Picture
Whether you’re a developer, a security auditor, or a compliance officer evaluating PCCI, here’s the core flow:You send a challenge
Your device generates a random number (a “nonce”) and asks the enclave to prove itself.
The hardware responds
The TEE hardware — not our software — generates a signed report. This report contains a fingerprint of all code running in the enclave, the security configuration of the platform, and your random challenge (to prove the report is fresh).
You verify the report
Your device checks the hardware manufacturer’s signature (is this really from AMD/Intel/NVIDIA?), confirms the code fingerprint matches the published value (is this the code we expect?), and validates your challenge is present (is this report fresh?).
Built in Rust, Runs as WebAssembly
The entire PCCI attestation stack is written in Rust and compiles to WebAssembly (WASM). This matters for two reasons:Memory Safety
Rust eliminates entire classes of security vulnerabilities — buffer overflows, use-after-free, data races — at compile time. The code that verifies attestation reports cannot be exploited through memory corruption because those bugs are impossible to introduce in Rust. This is a property of the language, not a testing claim.
Verify Anywhere
The WASM build runs directly in your browser — no server, no install, no trust in any intermediary. The same Rust code also compiles to native binaries for server-side use. One auditable codebase, two deployment targets.
- Rust crates —
nvidia-attest,snp-attest,tdx-attest, and the unifiedprem-rsclient - NPM WASM package —
@premAI-io/prem-rsfor browser and Node.js use
How the Attestation Code Is Organized
PCCI maintains two attestation codebases with different roles:pcci-attestation-stack is the main framework — a Rust workspace containing all verification implementations and a unified client:
| Component | Role |
|---|---|
nvidia-attest | Parses and verifies NVIDIA GPU attestation tokens |
snp-attest | Parses and verifies AMD SEV-SNP CPU reports |
tdx-attest | Parses and verifies Intel TDX CPU quotes |
libattest | Shared primitives — signature verification, nonce handling, certificate utilities |
attestation-server | Runs inside the CVM to generate attestation reports on request |
prem-rs | Unified client that abstracts over all attestation types with a single API |
nvat-rs is a low-level library that talks directly to NVIDIA GPU hardware to retrieve raw attestation evidence. Think of it as the hardware driver layer: nvat-rs retrieves the evidence from the GPU, and nvidia-attest verifies it.
This separation is a security design choice. The attestation server runs inside the trusted CVM where it talks to hardware. The verification libraries run on your device — potentially in a browser — where Rust’s memory safety and WASM’s sandboxing are critical because you’re running in an untrusted environment.
CPU Attestation
AMD SEV-SNP
When the enclave boots, every component is measured (fingerprinted) by the AMD Secure Processor — a dedicated security chip inside the CPU that the host OS cannot access. What the report contains:- MEASUREMENT — Fingerprint of the entire initial VM image
- HOST_DATA — Platform configuration data
- REPORT_DATA — Your challenge nonce + enclave public key
- TCB Version — Firmware and microcode versions (so you can confirm security patches)
- Policy flags — Debug disabled, migration disabled, single-socket enforced
- The report is signed by a key chain rooted in AMD’s root certificate — confirming genuine hardware
- Your nonce is present — confirming freshness (not a replay)
- The code fingerprint matches the published value — confirming the expected code is running
- Debug is disabled and firmware versions meet minimum thresholds — confirming a secure configuration
Intel TDX
Intel TDX provides equivalent guarantees through Trust Domains — hardware-isolated VMs with encrypted memory, managed by Intel’s TDX Module. What the quote contains:- MRTD — Fingerprint of the initial Trust Domain image
- RTMR registers — Runtime fingerprints of components loaded after boot
- REPORT_DATA — Your challenge nonce + enclave data
- TCB SVN — Security versions for TDX Module and platform firmware
prem-rs unified client, so the verification interface is identical regardless of which CPU platform the enclave runs on.
GPU Attestation (NVIDIA Confidential Computing)
NVIDIA GPUs on Hopper and Blackwell architectures produce their own attestation tokens — independent of the CPU. This means you can verify both the CPU enclave and the GPU separately.Token Format
GPU attestation uses Entity Attestation Tokens (EAT) — a structured JWT format:What GPU Attestation Proves
- The GPU is a genuine NVIDIA Hopper or Blackwell GPU — not emulated or modified
- Confidential compute mode is active — GPU memory is encrypted and isolated from the host
- Firmware is intact — Fingerprints match known-good values
- The report is fresh — Your challenge nonce is present
Verification
- Parse the JWT structure (overall token + per-GPU tokens)
- Validate each JWT’s signature against NVIDIA’s certificate chain
- Confirm your nonce is present
- Verify confidential compute is enabled and firmware versions are acceptable
- Cross-reference with the CPU attestation to confirm they’re from the same session
Attestation-Locked Routing
PCCI runs production-grade inference engines such as vLLM and SGLang inside the enclave. In a multi-GPU environment, PCCI needs to guarantee that the GPUs you attested are the same GPUs that run your inference. The model router handles this through session-based sticky routing, and supports multi-GPU attestation by default — when a backend uses multiple GPUs (e.g. for tensor parallelism), every GPU in the backend is attested and each produces its own per-GPU token inside the attestation response.You request attestation
Your client sends an attestation request with a nonce and the model you want to use. The model router randomly selects one of the available GPU backends for that model and forwards your request to it.
The GPU backend responds with attestation quotes
The selected backend generates an attestation response containing your nonce and a per-GPU token for every GPU in the backend — hardware identity, firmware fingerprints, and confidential compute status for each. The response is returned to the router.
The router locks the upstream
On a successful attestation response, the router creates a session — a temporary binding between a unique session ID and the specific GPU backend that produced the quotes. This session ID is returned to your client in the
X-Session-Id header. The session expires after 5 minutes.You verify the quotes in your browser
Your client verifies the attestation response — checking NVIDIA’s signature chain, your nonce, confidential compute status, and firmware integrity for every GPU in the backend. This happens entirely client-side.
You send the inference request with the session ID
Once verification passes, your client sends the inference request with the
X-Session-Id header. The router looks up the session, routes your request to the exact same GPU backend that produced the attestation quotes, and immediately consumes the session.Combined Attestation — The Full Chain
In production, your data passes through both CPU and GPU. PCCI provides attestation for both, so you can verify the entire processing pipeline: Both produce independent reports. Your browser verifies both — CPU and GPU attestation are checked client-side, confirming every step of the pipeline is hardware-protected.How to Verify — For Developers
Using the SDK (simplest)
The SDK handles attestation automatically. When you create a client, attestation is enabled by default (attest: true). Before each request, the SDK verifies CPU and GPU attestation via the @premAI-io/prem-rs WASM library, obtains a session ID from the router, and pins to the attested backend — all transparently.
modules attestation type (no nonce required):
Using the Rust/WASM Library (independent verification)
For teams that want to verify attestation independently, use theprem-rs crate (or its WASM build) directly:
What to Check
Code Fingerprint
Does the measurement hash match the published PCCI enclave hash? We publish these values with every release.
Hardware Authenticity
Does the signature chain root to AMD, Intel, or NVIDIA — not a self-signed or unknown authority?
Security Configuration
Is debug mode disabled? Are firmware versions current? Is GPU confidential compute active?
Freshness
Is your nonce present in the report? Was it generated in response to your specific request?
Certificate Chains
Both CPU and GPU attestation rely on certificate chains rooted in the hardware manufacturer: AMD SEV-SNP:Next Steps
We are working on open-sourcing the reproducible enclave images so that anyone can rebuild them from source and independently verify that the code fingerprints in attestation reports match the published binaries. This closes the last trust gap — you will be able to confirm not just that the hardware is genuine and the configuration is secure, but that the exact code running inside the enclave corresponds to auditable, publicly available source code. Beyond reproducible builds, we fulfill the complete DevOps cycle with full CI/CD integration and provenance artifacts for every build. Every enclave image is built, tested, and signed through automated pipelines that produce verifiable provenance — so you can trace any deployed artifact back to its source commit, build environment, and signing chain. All non-CVM infrastructure runs entirely on our local infrastructure — no third-party cloud services sit in the path between your request and the enclave. Build systems, CI/CD pipelines, image registries, and orchestration are self-hosted, reducing the attack surface and eliminating external dependencies from the trust model.Attestation is available today for AMD SEV-SNP (CPU), Intel TDX (CPU), and NVIDIA Hopper/Blackwell (GPU). All verification runs through a single Rust/WASM codebase — memory-safe, auditable, and executable in any environment from servers to browsers. See Platform Status for the full roadmap.

