Skip to content

How it works

  1. Build - Your application is compiled into a reproducible, deterministic artifact
  2. Deploy - The artifact is deployed to Caution's verifiable compute environment
  3. Prove - Cryptographic proofs attest to what code is running
  4. Verify - Anyone can verify the deployment matches the source