Skip to content
Caution

Caution

The verifiable compute hosting platform

Created on 1st December 2025

Caution

Caution

The verifiable compute hosting platform

The problem Caution solves

Judges can contact us at [email protected] to get a closed alpha access code.

Caution is a cloud hosting platform focused on the next generation of confidential compute - verifiable compute. People can use our fully open source software to deploy any workload into verifiable compute infrastructure. This is a useful fundamental building block for securing systems and decentralizing trust on the hardware level. Imagine using this tech to run a blockchain node, an oracle, a bridge, or an LLM in a manner where you can verify exactly what source code was used for that service, in real time, with cryptographic proof. Now you can. It's time to stop blindly trusting that the services you are using respect your privacy and play by the rules, and start verifying that they do.

We solve the problem that no current solutions do:

  • Proving exactly what software is running on a server using cryptographic remote attestation
  • Removing trust in single TEE hardware
  • Making deploying verifiable compute easy

What we sell:

  • Single tenancy one-click provably verifiable applications (blockchain nodes, LLMs, VPNs etc)
  • Managed on-premises deployments for businesses
  • Enterprise technical support

Most confidential compute solutions can isolate workloads and prove the code hasn't changed. Caution proves exactly what source code is running in an enclave, and it does so by using reproducible and full-source bootstrapped builds.

On top of this, we are actively developing EnclaveOS (https://git.distrust.co/public/enclaveos/) which currently targets AWS Nitro, but will soon be able to use multiple different kinds of hardware for attestation to eliminate single points of failure.

Challenges we ran into

The main challenges were around ensuring that the user can deploy software in a fully verifiable, while making the user experience feel seamless as it does with other great UX solutions such as Heroku and Fly.io.

To achieve this, careful attention was paid to have both a CLI native experience, including registration and login, using Passkey, which can also be used in the web browser.

Beyond that, there was a lot of piping to glue all the different stages of the system, as it is a fully functioning cloud hosting platform.

Tracks Applied (7)

General Bounty

We built a generalized verifiable compute platform that has a wide range of applications, including within the privacy a...Read More

Network School

Privacy-Preserving AI & Computation

Our confidential compute hosting platform solution allows running fully verifiable LLMs in secure encalves. This means o...Read More
Axelar Network

Axelar Network

Privacy Infrastructure & Developer Tools

We built a generalized verifiable compute framework that makes it easy (heroku-like) to deploy workloads into secure enc...Read More

Fhenix

Privacy Infrastructure & Developer Tools

We built a generalized verifiable compute framework that makes it easy (heroku-like) to deploy workloads into secure enc...Read More

Zcash Community Grants

Privacy Infrastructure & Developer Tools

We built a generalized verifiable compute framework that makes it easy (heroku-like) to deploy workloads into secure enc...Read More

Raybot

Privacy-Preserving AI & Computation

Our confidential compute hosting platform solution allows running fully verifiable LLMs in secure encalves. This means o...Read More
NEAR Protocol

NEAR Protocol

General Bounty

We built a generalized verifiable compute framework that makes it easy (heroku-like) to deploy workloads into secure enc...Read More

Project Tachyon

Discussion

Builders also viewed

See more projects on Devfolio