{"id":48239274,"url":"https://github.com/lockboot/vaportpm","last_synced_at":"2026-04-04T20:14:00.782Z","repository":{"id":336184751,"uuid":"1147124212","full_name":"lockboot/vaportpm","owner":"lockboot","description":"Rust library for cloud instance attestation. Verify workloads are running on genuine AWS Nitro or GCP Confidential VMs via provider-signed trust chains. Zero C dependencies.","archived":false,"fork":false,"pushed_at":"2026-02-03T15:42:29.000Z","size":117,"stargazers_count":0,"open_issues_count":1,"forks_count":0,"subscribers_count":0,"default_branch":"main","last_synced_at":"2026-02-03T19:35:30.149Z","etag":null,"topics":["attestation","aws-nitro","confidential-vm","rust","tpm2","trusted-computing","vtpm"],"latest_commit_sha":null,"homepage":"","language":"Rust","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/lockboot.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":null,"maintainers":null,"copyright":null,"agents":null,"dco":null,"cla":null}},"created_at":"2026-02-01T08:27:30.000Z","updated_at":"2026-02-03T12:49:37.000Z","dependencies_parsed_at":null,"dependency_job_id":null,"html_url":"https://github.com/lockboot/vaportpm","commit_stats":null,"previous_names":["lockboot/vaportpm"],"tags_count":null,"template":false,"template_full_name":null,"purl":"pkg:github/lockboot/vaportpm","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/lockboot%2Fvaportpm","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/lockboot%2Fvaportpm/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/lockboot%2Fvaportpm/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/lockboot%2Fvaportpm/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/lockboot","download_url":"https://codeload.github.com/lockboot/vaportpm/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/lockboot%2Fvaportpm/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":31412165,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-04-04T20:09:54.854Z","status":"ssl_error","status_checked_at":"2026-04-04T20:09:44.350Z","response_time":60,"last_error":"SSL_read: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["attestation","aws-nitro","confidential-vm","rust","tpm2","trusted-computing","vtpm"],"created_at":"2026-04-04T20:14:00.247Z","updated_at":"2026-04-04T20:14:00.778Z","avatar_url":"https://github.com/lockboot.png","language":"Rust","readme":"# v[apor]TPM\n\n**Cloud vTPM attestation library for Rust. Zero C dependencies.**\n\n\u003e What does the \"v\" in vTPM stand for?\n\nPhysical TPM trust is vapor. It evaporates under scrutiny - supply chain attacks, firmware vulnerabilities, the whole theater. The only meaningful TPM trust lives in cloud vTPMs, where the hypervisor **is** the root of trust. The \"v\" always stood for vapor. Everyone just forgot.\n\n## Crates\n\n| Crate | Description |\n|-------|-------------|\n| [vaportpm-attest](./crates/vaportpm-attest/) | Generate attestations - talks to TPM |\n| [vaportpm-verify](./crates/vaportpm-verify/) | Verify attestations - no TPM needed |\n\n## Trust Model\n\nThe verifier handles **cryptographic verification**:\n- Validates signatures and certificate chains\n- Identifies the cloud provider via embedded root CA hashes\n\nYou handle **policy decisions**:\n- Do the PCR values match known-good measurements?\n- Is the nonce fresh (replay protection)?\n\n## Supported Platforms\n\n| Platform | Status | Trust Anchor |\n|----------|--------|--------------|\n| AWS EC2 with Nitro v4+ | ✅ Working | Nitro Root CA |\n| GCP Confidential VM | ✅ Working | Google EK/AK CA Root |\n| Azure Trusted Launch | 🔜 Planned | Microsoft AK certificate |\n\nPlease note that GCP 'Shielded VM' with vTPM isn't enough, a 'Confidential VM' is necessary as Google doesn't provision AK certificates without that feature enabled (be it Intel TDX or AMD SEV)\n\n## Quick Start\n\n### Generate Attestation (on cloud instance)\n\n```rust\nuse vaportpm_attest::attest;\n\nlet json = attest(b\"challenge-nonce\")?;\n// Send json to verifier\n```\n\n### Verify Attestation (anywhere)\n\n```rust\nuse vaportpm_verify::verify_attestation_json;\n\nlet result = verify_attestation_json(\u0026json)?;\n// Verification succeeded - attestation is from a supported cloud provider\nprintln!(\"Provider: {:?}\", result.provider);\nprintln!(\"PCRs: {:?}\", result.pcrs);\n```\n\n## License\n\nMIT OR Apache-2.0\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Flockboot%2Fvaportpm","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Flockboot%2Fvaportpm","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Flockboot%2Fvaportpm/lists"}