Developers

Build Private. Ship Verifiable.

Oasis gives you the tools to add confidential execution to any application — on-chain or off-chain — without custom cryptography, proprietary VMs, or months of integration work. Write Solidity. Use Docker. Deploy in minutes.

One unified infrastructure. Two execution environments.

Oasis combines on-chain confidential smart contracts with off-chain verifiable compute. Use them independently or together — Sapphire for coordination and state, ROFL for heavy lifting and complex logic.

Sapphire — Confidential EVM

An EVM-compatible runtime that executes Solidity smart contracts inside TEEs. State and calldata are encrypted by default.

What It's For
  • Smart contracts with private state
  • MEV-resistant transactions
  • Encrypted shared state
  • On-chain coordination
Developer Experience
  • Write standard Solidity
  • Use Hardhat, Foundry, Remix
  • Connect with MetaMask
  • Deploy like any EVM chain
// Confidential token with hidden balances contract PrivateToken { mapping(address => uint256) private balances; // encrypted by default function transfer(address to, uint256 amount) external { require(balances[msg.sender] >= amount); balances[msg.sender] -= amount; balances[to] += amount; } // Only the owner can view their balance function myBalance() external view returns (uint256) { return balances[msg.sender]; } }

ROFL — Runtime Off-chain Logic

A framework for running containerized applications inside TEEs with continuous on-chain attestation. Execution is confidential, verifiable, and connected to Sapphire for coordination.

What It's For
  • Autonomous agents
  • Complex compute off-chain
  • AI inference and models
  • Backend services with trust
Developer Experience
  • Write in any language
  • Package with Docker
  • Standard deployment
  • Built-in KMS integration

Key Management Service (KMS)

Secure key generation and storage inside TEEs. Private keys never leave the enclave. Enable autonomous signing for agents and apps without custodial dependencies.

Choose your entry point.

Four paths based on what you're building.

~15 minutes

Add Privacy to Smart Contracts

Solidity developers who want to add confidential state to new or existing contracts.

Sapphire Quick Start →

~30 minutes

Build a Verifiable Backend

Backend developers who need verifiable execution for APIs, agents, or services.

ROFL Quick Start →

~1 hour

Build an Autonomous Agent

Teams building AI agents that need trustless key management and verifiable behavior.

Agent Development Guide →

~1 hour

Migrate an Existing dApp

Teams with existing EVM applications who want to add privacy features.

Migration Guide →

Your tools. Your workflow. Our privacy.

Standard Tooling

Solidity & EVM: Write contracts in Solidity. Deploy with Hardhat or Foundry. Test with your existing suite.

Containers: Package ROFL apps with Docker. Use your existing CI/CD pipelines.

Languages: ROFL supports any language that runs in a container.

What's Different

Encrypted by Default: Sapphire contract state is encrypted. Think about what should be visible, not how to hide it.

Attestation Handled: ROFL manages TEE attestation automatically. You write application logic.

Key Access Built In: KMS integration is native. Request signing without managing key infrastructure.

How trust works.

All confidential execution happens inside Trusted Execution Environments — hardware-isolated enclaves that protect code and data from the host system, other processes, and even the infrastructure operator.

Layered Security

Hardware Isolation

TEEs provide memory encryption and access controls at the hardware level.

Attestation

Remote attestation proves enclave identity, code version, and hardware state to verifiers.

On-Chain Verification

Oasis consensus continuously validates attestations, enforces policies, and governs upgrades.

Economic Security

Operators stake ROSE tokens, creating economic incentive alignment and slashing conditions.

Defense in depth. TEEs provide the foundation; attestation, consensus, and economic security add layers. No single point of failure.

Start building with verifiable privacy.

Deploy your first confidential contract in 15 minutes. Or talk to our team about your specific use case.