Add your description here
Project description
SecureAI
SecureAI is a Python library that adds RATLS (Remote Attestation TLS) support to popular HTTP clients, including OpenAI SDK and httpx. It enables applications to cryptographically verify that AI inference and API services are running inside Trusted Execution Environments (TEEs) like Intel TDX before sending sensitive data.
The library transparently extends existing clients - simply specify which hostnames require TEE attestation, and SecureAI handles the verification automatically during the TLS handshake.
TODO: SecureAI can't know what are all the expected measurement values, so we should provide a way to set that in the future.
Installation
SecureAI uses uv for dependency management and building.
You can install SecureAI from PyPI or build it from source.
# From PyPI
uv pip install secureai
# From source
git clone https://github.com/concrete-security/secureai.git
cd secureai
uv build # to build the wheel
uv pip install dist/secureai-*.whl
What is RATLS?
Remote Attestation TLS (RATLS) extends standard TLS with hardware-based attestation to verify that a server is running inside a Trusted Execution Environment (TEE) like Intel TDX. This ensures your data is processed in a secure, isolated environment.
RATLS provides cryptographic proof that the client is communicating with the correct server identity (as defined in the TLS certificate) and that the server is running inside a TEE.
Context
The TEE server maintains an event log that records all significant operations, including TLS certificate renewals. When the server generates a new certificate (using keys created inside the TEE that never leave it), it appends an event to this log containing the certificate hash.
The TEE hardware uses these event logs to compute Runtime Measurements (RTMRs) - cryptographic hashes that reflect the entire state and history of the TEE. These RTMRs are included in the attestation quote and can be verified by clients to ensure the TEE is running expected software with the expected certificate.
How it works
- Pre-RATLS Setup (happens before client connects): Server adds a certificate event to its event log whenever it renews its TLS certificate. This updates the RTMR3 register using the new certificate hash.
- TLS Connection: Client establishes a standard TLS connection with the server and retrieves the TLS certificate.
- Quote Request: Client sends random challenge data (64 bytes) and requests a cryptographic quote from the TEE.
- Quote Response: Server generates and returns a quote signed by the TEE hardware, along with metadata:
- Quote contains: random challenge data, runtime measurements (RTMRs)
- Metadata contains: event log with TLS certificate hash
- Verification: Client verifies:
- Quote signature using the DCAP library
- TLS certificate (current session) matches the one in the event log
- Event log correctly produces the RTMRs by replaying all events
- TEE measurements match expected values
- TCB status is UpToDate
Client Server (TEE)
|----- Pre-RATLS ---------------------------|
| |
| |
| 0. Append new event to the
| event log with cert hash
| when doing cert renewal
| |
| |
|----- RATLS -------------------------------|
| |
| 1. TLS Handshake |
|<=========================================>|
| (Get TLS certificate) |
| |
| 2. POST /tdx_quote |
| { report_data: <random_64_bytes> } |
|------------------------------------------>|
| |
| 3. Generate Quote + Metadata
| - Quote include report_data, RTMRs, ...
| - Metadata include event_log containing cert hash
| - Sign with TEE hardware key
| - Other measurements
| 4. Quote Response |
|<------------------------------------------|
| |
| 5. Client Verification |
| - Verify quote signature (DCAP) |
| - Check report_data matches challenge |
| - Check cert hash in event_log matches |
| - Verify event_log by replaying RTMRs |
| - Verify TCB status is UpToDate |
| |
| 6. Regular HTTPS requests |
| (if verification passed) |
|<=========================================>|
Server Requirements
For a server to support RATLS verification with SecureAI, it must:
- Run inside a TEE: Currently only Intel TDX is supported
- Maintain an event log: Record all significant operations including TLS certificate renewals with certificate hashes
- Provide a quote endpoint: Expose an HTTP POST endpoint (default:
/tdx_quote) that:- Accepts JSON with
report_data_hexfield (64 bytes hex-encoded) - Returns a JSON response containing:
quote: TDX quote (hex-encoded) signed by TEE hardwareevent_log: JSON array of events used to compute RTMRs
- Accepts JSON with
- Generate TLS certificates inside the TEE: Private keys must never leave the TEE
- Update RTMRs on certificate renewal: Append certificate hash events to the log, updating RTMR3
See the server implementation reference for a complete example.
Examples
You can set DEBUG_RATLS=true to see debug logs.
OpenAI Client with RATLS
from secureai import OpenAI
# This shouldn't work now as api.openai.com doesn't support RATLS
client = OpenAI(ratls_server_hostnames=["api.openai.com"])
HTTP Client with RATLS
from secureai import httpx
with httpx.Client(ratls_server_hostnames=["vllm.concrete-security.com"]) as client:
# No RATLS as not in the list
response = client.get("https://httpbin.org/get")
print(f"Response status: {response.status_code}")
# Uses RATLS
response = client.get("https://vllm.concrete-security.com/health")
print(f"Response status: {response.status_code}")
# This shouldn't trigger another verification as the connection is still open
response = client.get("https://vllm.concrete-security.com/v1/models")
print(f"Response status: {response.status_code}")
Development
SecureAI uses uv for dependency management and building.
Running Tests
# Run all tests
uv run pytest
Code Quality
# Format code
uv run ruff format
# Lint code
uv run ruff check
# For import order specifically
uv run ruff check --select I
Build
# Build a wheel from source
uv build
Hardware Support
Only TDX is supported at the moment.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file secureai-0.1.0.tar.gz.
File metadata
- Download URL: secureai-0.1.0.tar.gz
- Upload date:
- Size: 15.1 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
bf87be8a9903b0ba94921618d02419a7c6ef51239bb55d068c32e57f00869ce3
|
|
| MD5 |
8e40752bb50d36edc029ea5abd70da60
|
|
| BLAKE2b-256 |
ccba0563a3f4fa55f76ae456b7f17ee5d6f65032c4241d273147e9a537d5fb2a
|
Provenance
The following attestation bundles were made for secureai-0.1.0.tar.gz:
Publisher:
publish.yml on concrete-security/secureai
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
secureai-0.1.0.tar.gz -
Subject digest:
bf87be8a9903b0ba94921618d02419a7c6ef51239bb55d068c32e57f00869ce3 - Sigstore transparency entry: 720347390
- Sigstore integration time:
-
Permalink:
concrete-security/secureai@38e7737138019f68b800a86c320723a02fd3bc3a -
Branch / Tag:
refs/heads/main - Owner: https://github.com/concrete-security
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@38e7737138019f68b800a86c320723a02fd3bc3a -
Trigger Event:
workflow_dispatch
-
Statement type:
File details
Details for the file secureai-0.1.0-py3-none-any.whl.
File metadata
- Download URL: secureai-0.1.0-py3-none-any.whl
- Upload date:
- Size: 18.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
97993b95b19c72ae4b0faad23f9c335914704913cd7c25ccfaf1a3520e930132
|
|
| MD5 |
00c3db39fd2e6f2be60de103169337c5
|
|
| BLAKE2b-256 |
a4028684fdd76a22057920e32e0ac6b3bc8e216a9d53fcea25c20ab26d910f81
|
Provenance
The following attestation bundles were made for secureai-0.1.0-py3-none-any.whl:
Publisher:
publish.yml on concrete-security/secureai
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
secureai-0.1.0-py3-none-any.whl -
Subject digest:
97993b95b19c72ae4b0faad23f9c335914704913cd7c25ccfaf1a3520e930132 - Sigstore transparency entry: 720347396
- Sigstore integration time:
-
Permalink:
concrete-security/secureai@38e7737138019f68b800a86c320723a02fd3bc3a -
Branch / Tag:
refs/heads/main - Owner: https://github.com/concrete-security
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@38e7737138019f68b800a86c320723a02fd3bc3a -
Trigger Event:
workflow_dispatch
-
Statement type: