Trust boundary
Verify that the hosted API runs the published open-source workload.
api.quillrouter.com is the prompt path. Public TLS terminates inside the measured GCP Confidential Space workload. The TrustedRouter control plane does not serve production inference routes and does not receive prompt or output bodies.
Clients can fetch the live attestation, verify issuer/audience/digest, and compare the measured image digest with the release data published here.
Client Verification
- OKFetch
https://api.quillrouter.com/attestationover normal public TLS. - OKVerify the JWT issuer is
https://confidentialcomputing.googleapis.com. - OKVerify the audience is
quill-cloud. - OKCompare the attested image digest with this page.
- OKCheck the TLS certificate fingerprint is bound into the attestation nonce.
DNS Requirement
api.quillrouter.com must remain DNS-only or TCP-passthrough. TLS termination by a CDN would break the hosted-code trust claim because the prompt path certificate key must remain inside the measured workload.
No Prompt Logs
Prompt/output storage is disabled. Generation content endpoint returns a compatible content_not_stored response.
Hosted Open Source
Control plane, billing, keys, compatibility routes, dashboard, and trust page.
Attested prompt gateway, release digest, and Confidential Space verification path.
Cloud deployment scripts, measured workload bringup, and trust publication flow.
Open-source Quill client, device, bootstrap, and attestation-facing code.
Python SDK repository for attestation-aware client helpers.
JavaScript SDK repository for browser and Node integrations.
Fail Closed
If attestation, billing authorization, or the gateway contract is unavailable, the prompt path should fail rather than silently downgrade to a non-attested route.
Machine-readable release
{
"api_base_url": "https://api.quillrouter.com/v1",
"attestation_audience": "quill-cloud",
"attestation_issuer": "https://confidentialcomputing.googleapis.com",
"data_policy": {
"control_plane_prompt_access": false,
"prompt_output_storage": false
},
"image_digest": "sha256:658eee7842c13a7ea6d15242dca3307622897bdc9434a1c4dad18702db0c5f0f",
"image_reference": "us-central1-docker.pkg.dev/quill-cloud-proxy/quill/enclave-openrouter:gcp-release-2ed4d5a",
"platform": "gcp-confidential-space",
"source_commit": "2ed4d5a",
"source_repo": "https://github.com/Lore-Hex/quill-cloud-proxy",
"source_repositories": {
"attested_gateway": "https://github.com/Lore-Hex/quill-cloud-proxy",
"cloud_infra": "https://github.com/Lore-Hex/quill-cloud-infra",
"control_plane": "https://github.com/Lore-Hex/quill-router",
"javascript_sdk": "https://github.com/Lore-Hex/trusted-router-js",
"python_sdk": "https://github.com/Lore-Hex/trusted-router-py",
"quill": "https://github.com/Lore-Hex/quill"
},
"tls": {
"hostname": "api.quillrouter.com",
"mode": "acme-inside-confidential-space"
}
}