Live on Base Sepolia · EAS Attested · x402 Payments

Every cloud asks you
to trust them.

We are the only one that proves you cannot.

Describe your stack in plain English. An AI agent deploys it in under 60 seconds with LUKS-encrypted containers, per-provider EAS attestation, and x402 micropayments.

Launch AppView on GitHub

Agentic Deployment SDK

Describe your stack.
The agent handles everything.

The agent uses Claude with a fixed set of constrained tools. No raw shell access. No filesystem access outside your mounted volume. Every call is logged and the merkle root is attested on-chain.

analyze_repo()select_provider()create_container()install_packages()configure_network()attach_storage()setup_ide()setup_database()generate_keypair()health_check()get_logs()destroy_container()
Python
Node.js
Go
REST
 1import comput3
 2
 3client = comput3.Client(api_key="ck_live_...")
 4
 5# Natural language deployment
 6job = await client.deploy("""
 7  React frontend, FastAPI backend with pandas,
 8  PostgreSQL 16, all connected on an internal network
 9""")
10
11# Agent calls: generate_keypair, select_provider,
12# create_container x3, install_packages x2,
13# configure_network, setup_ide, attach_storage
14# Every call is logged and attested on-chain
15
16async for step in job.stream():
17    print(step.tool, step.status)
18
19# Verify the full action log
20attestation = await job.get_attestation()
21print(attestation.eas_uid)       # on Base Sepolia
22print(attestation.merkle_root)   # recompute locally
< 60s
Deployment timeFrom natural language to running encrypted containers with access credentials
x402
Payment modelHTTP-native per-request micropayments. No central gatekeeper, no lock-in
EAS
On-chain proofPer-provider attestation on Base Sepolia, signed by the provider wallet, not ours
LUKS
Data privacyFilesystem encrypted with your key, generated in your browser, never sent to the server

Three Pillars

Trust is not assumed.
It is proven.

Zkloud combines three properties no existing platform has together: agentic UX, verifiable confidentiality, and per-provider on-chain attestation.

01
Confidential Containers

Every container runs with LUKS2 filesystem encryption. The key is derived from your keypair, generated in-browser, never sent to the server. Even with root access on the host machine, the operator cannot read your data.

02
Agentic Deployment

Describe your stack in plain English. The agent calls a constrained set of tools with no raw shell access and no filesystem access outside your mounted volumes. It cannot do anything you did not ask for.

03
On-Chain Verification

Every tool call is appended to an immutable action log. The merkle root of all action hashes is attested on-chain via EAS, signed by the provider wallet, not ours. Recompute the root yourself to verify nothing extra ran.

Deploy NowRead Architecture
Confidential Containers
Agentic Deployment
On-Chain Attestation
LUKS Encryption
EAS on Base Sepolia
x402 Micropayments
ProviderRegistry.sol
Permissionless Network
gVisor Sandboxing
Merkle Action Log
Claude Function Calling
Zero Root Access
Confidential Containers
Agentic Deployment
On-Chain Attestation
LUKS Encryption
EAS on Base Sepolia
x402 Micropayments
ProviderRegistry.sol
Permissionless Network
gVisor Sandboxing
Merkle Action Log
Claude Function Calling
Zero Root Access

Competitive Landscape

Nobody else does
all four.

Every competitor is missing at least one of: agentic deployment, verifiable confidentiality, per-provider on-chain attestation, or an open permissionless provider network.

FeatureAWS / GCPReplit AgentFluencePhalaAkashCOMPUT3
Agentic Deployment
Natural language to running infrastructure
No
Manual CLI and console configuration
Yes
Conversational but fully trust-based
No
Requires DevOps knowledge
No
SDK-based, no natural language interface
No
CLI marketplace only
Yes
Claude with constrained tool set
Confidential Compute
Operator cannot read your data
No
Trust-based operator access
No
Replit reads all project files
Roadmap
TEE listed as R&D exploration only
Partial
TEE for specific workload types
No
No confidentiality guarantees
Yes
LUKS per-container, key never leaves browser
On-Chain Attestation
Cryptographic proof of what the agent ran
No
No
No
Billing SLAs only
Partial
Compute proofs, not full action logs
No
SLAs only
Full
Per-provider EAS, merkle action log on Base
Open Provider Network
Anyone can join as a compute provider
No
Closed and centralized
No
Centralized infrastructure
Yes
Token-gated marketplace
Partial
TEE hardware requirement
Yes
Open marketplace
Yes
Stake USDC in ProviderRegistry.sol

COMPUT3 is the only platform combining all four properties.

Ecosystem

Connect any agent
to any verified provider.

COMPUT3 sits between AI agents and compute infrastructure, handling payments, encryption, and attestation transparently.

AI Agent
any client
Claude
Anthropic
Python SDK
3.10+
REST API
HTTP/2
CLI
terminal
Web UI
browser
COMPUTE
Docker
runtime
LUKS2
encrypted
Base L2
Ethereum
EAS
attestation
x402
payments
gVisor
sandbox
3
active providers
< 60s
average deploy
1 tx
per attestation
0.01 USDC
compute per minute

Frequently Asked Questions

More questions? Open an issue on GitHub.

Use Cases

Deploy any workload.
Any stack. In seconds.

Verified on-chain. Operator-proof encryption. No trust required.

Finance
DeFi Analytics

React, FastAPI, and PostgreSQL. Agent provisions three containers, configures internal networking, and submits an EAS attestation for the full deployment.

Events
Hackathon Infrastructure

Each team receives a private encrypted environment. No team can read another's code. Cryptographically guaranteed, not just policy.

AI / ML
Model Training

Python and CUDA container with attached encrypted storage. Payments stream per-second via x402. Stop anytime and pay only what you used.

Web3
Smart Contract Backend

Node.js API with Redis and deployment scripts. The agent selects the cheapest available provider from ProviderRegistry.sol automatically.

Compliance
Privacy-Sensitive Workload

Healthcare or legal data processing. LUKS encryption ensures the host operator cannot access patient or client data under any circumstances.

DevEx
Rapid Prototype

No Docker knowledge required. Describe your stack in plain English, receive a running environment with a web IDE in under sixty seconds.

Finance
DeFi Analytics

React, FastAPI, and PostgreSQL. Agent provisions three containers, configures internal networking, and submits an EAS attestation for the full deployment.

Events
Hackathon Infrastructure

Each team receives a private encrypted environment. No team can read another's code. Cryptographically guaranteed, not just policy.

AI / ML
Model Training

Python and CUDA container with attached encrypted storage. Payments stream per-second via x402. Stop anytime and pay only what you used.

Web3
Smart Contract Backend

Node.js API with Redis and deployment scripts. The agent selects the cheapest available provider from ProviderRegistry.sol automatically.

Compliance
Privacy-Sensitive Workload

Healthcare or legal data processing. LUKS encryption ensures the host operator cannot access patient or client data under any circumstances.

DevEx
Rapid Prototype

No Docker knowledge required. Describe your stack in plain English, receive a running environment with a web IDE in under sixty seconds.

Deploy trustlessly.
Verify on-chain.

COMPUT3 is live on Base Sepolia. Three provider nodes are running. Start deploying in under 60 seconds.

Base SepoliaEAS Attestedx402 ProtocolLUKS EncryptedOpen Source