TEE Command
Manage TEE deployments on ElizaOS
ElizaOS TEE
The tee
command provides access to Trusted Execution Environment (TEE) deployment and management capabilities through integrated vendor CLIs.
Overview
TEE (Trusted Execution Environment) enables secure and verifiable agent operations on blockchain. The tee
command currently supports Phala Cloud as a TEE provider, with the potential for additional vendors in the future.
Installation
Command Structure
Available Vendors
Phala Cloud
The phala
subcommand provides a wrapper for the official Phala Cloud CLI, allowing you to manage TEE deployments on Phala Cloud directly through ElizaOS.
The Phala CLI will be automatically downloaded via bunx if not already installed.
Usage Examples
Get Phala CLI Help
Authentication
Managing CVMs (Confidential Virtual Machines)
Additional Phala Commands
The Phala CLI also provides these additional commands:
TEE Agent Deployment
For deploying ElizaOS agents to TEE environments:
-
First, create a TEE-compatible project:
-
Configure your agent and prepare deployment files
-
Deploy to Phala Cloud:
Configuration
Prerequisites
- Bun installed (required for automatic Phala CLI installation)
- Phala Cloud account and API key (for deployment operations)
- Docker compose file for CVM deployments
Environment Variables
When deploying TEE agents, ensure your environment variables are properly configured:
Advanced Usage
Direct Phala CLI Access
All Phala CLI commands and options are available through the wrapper:
For the complete list of Phala CLI commands and options, run:
Or visit the official Phala CLI documentation:
Troubleshooting
Common Issues
-
bunx not found: Install Bun from bun.sh:
-
Authentication failures: Ensure your API key is valid and you’re logged in:
-
Deployment errors: Check your docker-compose.yml file is valid and all required services are defined
Debug Mode
For detailed output when troubleshooting:
Integration with ElizaOS
TEE deployments enable:
- Secure key management: Private keys never leave the TEE
- Verifiable computation: Cryptographic proof of agent behavior
- Blockchain integration: Direct onchain operations with attestation
- Privacy preservation: Sensitive data processing in secure enclaves
Related Documentation
Security Considerations
When deploying agents to TEE:
- Never commit private keys or sensitive configuration
- Use environment variables for secrets
- Verify attestation reports for production deployments
- Follow Phala Cloud security best practices