Our guarantee
Two guarantees on this page. First: the user's credentials never reach our servers — the session lives on their device or inside an isolated TEE-hosted client even our team cannot access. Second: the code generating verifications in production is provably the same code published on GitHub. Both confirmed by hardware, not by our word.
Where the credentials actually live
TEE_REMOTE_BROWSER — a confidential VM. The credentials live entirely inside the enclave; even our own engineers, our cloud provider, and the host OS cannot read or modify what's in there. The hardware attestation below proves the enclave is running the published code, not a backdoored copy.The threat model
How it’s enforced
How you verify
What you still trust
The components
Each critical component runs inside its own TEE. TEE_K and TEE_A handle key material and verification orchestration. TEE_REMOTE_BROWSER hosts the user's browser session when the verification doesn't happen on the user's own device, so credentials still never leak to us. It's only used in the nodejs-sdk; the inapp-sdk uses the local in-app browser, where this is unnecessary.

Today · May 13· 84 days ahead are placeholders for future runs
| Session | Timestamp | Image hash | Verdict |
|---|---|---|---|
| 25f37f**** | 5/12/2026, 2:53:55 PM | workloadus-docker.pkg.dev/rc-popcorn/popcorn-images/browser-runtime@sha256:38fe2da54…a12b8d verifierus-docker.pkg.dev/rc-popcorn/popcorn-images/browser-runtime-attestor@sha256:e38a5e517…6cfd3b | ✓ Pass |
| d06f95**** | 5/12/2026, 2:51:39 PM | workloadus-docker.pkg.dev/rc-popcorn/popcorn-images/browser-runtime@sha256:38fe2da54…a12b8d verifierus-docker.pkg.dev/rc-popcorn/popcorn-images/browser-runtime-attestor@sha256:e38a5e517…6cfd3b | ✓ Pass |
| 6c1ca1**** | 5/12/2026, 2:47:13 PM | workloadus-docker.pkg.dev/rc-popcorn/popcorn-images/browser-runtime@sha256:38fe2da54…a12b8d verifierus-docker.pkg.dev/rc-popcorn/popcorn-images/browser-runtime-attestor@sha256:e38a5e517…6cfd3b | ✓ Pass |
| bb247a**** | 5/12/2026, 2:38:42 PM | workloadus-docker.pkg.dev/rc-popcorn/popcorn-images/browser-runtime@sha256:38fe2da54…a12b8d verifierus-docker.pkg.dev/rc-popcorn/popcorn-images/browser-runtime-attestor@sha256:e38a5e517…6cfd3b | ✓ Pass |
| 6998b4**** | 5/12/2026, 2:38:27 PM | workloadus-docker.pkg.dev/rc-popcorn/popcorn-images/browser-runtime@sha256:38fe2da54…a12b8d verifierus-docker.pkg.dev/rc-popcorn/popcorn-images/browser-runtime-attestor@sha256:e38a5e517…6cfd3b | ✓ Pass |
workload
browser-runtime
image digest
us-docker.pkg.dev/rc-popcorn/popcorn-images/browser-runtime@sha256:38fe2da549b9767075d2a2b518a29399155aa562c3af51d4fe637c6bd3a12b8d
verifier
browser-runtime-attestor
image digest
us-docker.pkg.dev/rc-popcorn/popcorn-images/browser-runtime-attestor@sha256:e38a5e517b60a1851b59c10d8db1e41ce7e106a2cdaf3e07e4b81512f96cfd3b
Each session above is graded by exact-match comparison against these two digests. The ai-agent image referenced in values.yaml runs alongside but is not part of the per-session attestation envelope.