Versions:

  • 0.7.1
  • 0.7.0
  • 0.6.4
  • 0.6.3
  • 0.6.2
  • 0.6.1
  • 0.6.0
  • 0.5.1

Enarx is an open-source runtime designed to enable Confidential Computing for applications packaged as WebAssembly modules, allowing sensitive workloads to execute within hardware-based Trusted Execution Environments (TEEs) on AMD SEV-SNP, Intel TDX, or IBM PEF without exposing data or code to host operating systems, hypervisors, or cloud providers. Maintained by The Enarx Project, the platform currently ships at version 0.7.1 and has released eight numbered versions to date, reflecting iterative improvements in attestation, cryptographic provisioning, and cross-platform deployment. Typical use cases include running encrypted machine-learning inference, private multi-party analytics, secure key management, and tamper-resistant financial transactions in public, hybrid, or edge clouds while preserving verifiability through remote attestation workflows. Because workloads are compiled to WebAssembly, developers can write in Rust, C, Go, or other supported languages and then deploy the same artifact across heterogeneous CPU architectures without recompilation, simplifying DevOps pipelines that must meet strict regulatory or corporate confidentiality mandates. The software exposes a command-line interface and Rust crates that handle attestation evidence, TLS termination inside the enclave, and transparent key injection, eliminating the need for specialized SDKs or kernel modules on the deployment target. Enarx operates in the security and virtualization category, positioning itself as an alternative to traditional process-level sandboxing or language-native runtimes by adding hardware-enforced memory encryption and integrity checks. Community binaries are available for free on get.nero.com, with downloads provided via trusted Windows package sources such as winget, always delivering the latest version, and supporting batch installation of multiple applications.

Tags: