Push, then run
Build any Docker image. `enclavia push` uploads it to your private registry namespace. `enclavia enclave create` boots it inside an AWS Nitro enclave.
Run your container inside an attested enclave. End-to-end encryption from the browser. Public beta.
Enclavia is a managed platform for running container workloads inside hardware-attested enclaves. You point it at a Docker image; it builds an enclave image, boots it on Nitro hardware, and exposes it behind a WebSocket proxy that speaks an end-to-end encrypted channel directly to the enclave.
The pieces a user touches:
enclavia CLI — authenticate, push images, create and manage enclaves.enclavia client library (Rust) — connect from a server or browser, verify attestation, send HTTP through the encrypted channel.https://api.beta.enclavia.io. Documented implicitly through the CLI.https://mcp.beta.enclavia.io/mcp. Lets Claude drive your enclaves over the Model Context Protocol with the same identity the CLI uses.The public beta runs at beta.enclavia.io and is intended for evaluation. Image references resolve against registry.beta.enclavia.io under your handle (the user-chosen identifier set during onboarding). The CLI talks to https://api.beta.enclavia.io and the encrypted client connects to enclaves under enclaves.beta.enclavia.io.
A machine-readable index of these docs is published at /llms.txt — the convention for surfacing documentation to LLMs without parsing HTML. Feed it to your agent of choice.