v0.0.1 · available now

Download KruxOS

Two install paths. Pick the one that matches what you're doing.

Choose your install

Docker to try. VM to ship.

Docker gets you running in 30 seconds. The VM appliance is the production target — it's the only path that supports Code Sessions (per-call fork into a fresh agent VM), because Docker doesn't delegate cgroup v2.

01 · Evaluation

Docker

Pull, run, open the dashboard — 30 seconds.

$ docker pull altvale/kruxos:v0.0.1
  • All 89 capabilities, policy engine, audit log
  • Cross-platform: macOS, Linux, Windows (WSL2)
  • Code Sessions — unsupported (cgroup v2)
  • Privileged sandbox layers (Landlock, seccomp BPF)

Best for: kicking the tires, dashboard preview, policy authoring.

VM appliance · images

Bootable VMs & bare metal.

Same image, every hypervisor format. Boot it on a Mac mini, a VPS, a vSphere cluster, or write it to a USB stick with dd.

Checksums & signatures: SHA256SUMS · SHA256SUMS.sig · cosign bundles
Verify your download

Don't trust. Verify.

Two ways. The first catches transport errors. The second proves the artifact was built by us, on our CI, from our source.

01 · Checksums

SHA256SUMS

# pulls SHA256SUMS from the release
sha256sum -c SHA256SUMS

One line per artifact. Confirms the file you have matches the file we published. Doesn't prove who published it.

02 · Cosign signature

Sigstore keyless verification

cosign verify-blob \
  --bundle kruxos-x86_64.vmdk.cosign.bundle \
  --certificate-identity-regexp 'https://github.com/altvale/kruxos/.*' \
  --certificate-oidc-issuer 'https://token.actions.githubusercontent.com' \
  kruxos-x86_64.vmdk

Each artifact ships with a .cosign.bundle next to it on the Releases page. Verifies signer identity + OIDC issuer — proves the binary came from the altvale/kruxos GitHub Actions workflow.

Next

Got the image. What now?

Quickstart guide Write your first policy Discord — install help