Forge
Forge Hosting for existing repos and stacks; Forge AI Builder (Coming Soon) to describe and ship a full app in the browser. Both land on the same Kraph backend.
// CONFIDENTIAL BY DESIGN • SUPABASE-COMPATIBLE • AGENT-NATIVE
AI can write code. Now it can ship and run real products — autonomously.
Most AI tools can generate UI and logic — but turning that into a live product still means humans handling billing, servers, and ten different services.
Kraph removes the bottleneck. With a wallet (or just a few clicks in Forge), any AI builder or agent can instantly stand up a complete, secure backend: database, auth, APIs, files, server logic, secrets, and a shareable frontend. Pay only for what you use on Solana.
Forge gives you two easy ways in:
MCP is the direct agent path. Same powerful network underneath.
Kraph is the secure, all-in-one cloud purpose-built for AI apps and autonomous agents.
Today’s AI can generate code instantly — but it still can’t reliably run production without humans managing accounts, cards, and servers. Kraph fixes that.
Give your AI a Solana wallet (or use Forge) and it can provision its own complete backend in seconds: database, authentication, APIs, file storage, server logic, secrets, and a shareable frontend. Everything is encrypted, attested on hardware, and paid per actual usage on Solana via x402. No credit cards. No vendor lock-in. Just production-ready infrastructure that agents can truly own.
Forge Hosting for existing repos and stacks; Forge AI Builder (Coming Soon) to describe and ship a full app in the browser. Both land on the same Kraph backend.
Drop-in Supabase-shaped backend (Postgres, Auth, Realtime, Storage, Edge Functions, Studio, IPFS) orchestrated per project. Same SDKs you already use.
Agents and developer tools call kraph_provision to create infrastructure programmatically. Wallet-authenticated, x402 USDC payments settle per call on Solana. Works inside Claude Code, Cursor, etc.
Independent operators supply compute and storage. The protocol handles placement, payments, encrypted WAL replication, and AMD SEV-SNP attestation checks for production workloads.
Concrete outputs, not platform abstractions: Postgres, Auth, Storage, Edge Functions, Realtime, IPFS, and encrypted env vars. Build with Forge Hosting, Forge AI Builder (Coming Soon), or provision directly via MCP.
Postgres + Realtime + Storage for durable agent memory, files, and session state — same @supabase/supabase-js patterns you already use.
Deno edge functions next to your data, with encrypted env vars for API keys and connector credentials.
Pin static frontends to content-addressed storage so each agent can have a shareable URL or embed alongside its API.
Optional wallet identity and x402 USDC on Solana meter infrastructure per tool call — no card on file when you deploy via MCP.
Independent nodes host workloads with encrypted WAL replication; mainnet-tier placement can use AMD SEV-SNP attested hardware.
Inbound and outbound mail for auth flows, digests, notifications, and support — live for allowlisted team mailboxes via MCP today; broader self-serve access is planned as packaging matures.
Secrets stay encrypted (plaintext only inside attested runtimes). Data is replicated with cryptographic proofs. Production workloads run only on verified AMD SEV-SNP hardware. The network itself enforces the rules — no single company can see or touch your data. Agents can operate with confidence.
Bring your existing work and host it instantly on Kraph.
Build from scratch with prompts — no separate LLM needed.
Prefer a hosted builder? Start with Forge. Prefer your own editor and agents? Use MCP here.
Today, MCP is the developer path: authenticate with a Solana wallet, call kraph_provision, and connect your app to returned URLs and keys.
/mcp setup is awkward.claude mcp add kraph -- npx -y @kraph/mcp-stdio \
--keypair ~/.config/solana/id.json \
--network devnet
{
"mcpServers": {
"kraph": {
"command": "npx",
"args": ["-y", "@kraph/mcp-stdio",
"--keypair", "~/.config/solana/id.json",
"--network", "devnet"]
}
}
}
%APPDATA%\Claude\claude_desktop_config.json
~/Library/Application Support/Claude/claude_desktop_config.json
{
"mcpServers": {
"kraph": {
"command": "npx",
"args": ["-y", "@kraph/mcp-stdio",
"--keypair", "~/.config/solana/id.json",
"--network", "devnet"]
}
}
}
{
"mcpServers": {
"kraph": {
"command": "npx",
"args": ["-y", "@kraph/mcp-stdio",
"--keypair", "~/.config/solana/id.json",
"--network", "devnet"]
}
}
}
claude mcp add kraph -- npx -y @kraph/mcp-stdio \
--keypair ~/.config/solana/id.json \
--network mainnet-beta
{
"mcpServers": {
"kraph": {
"command": "npx",
"args": ["-y", "@kraph/mcp-stdio",
"--keypair", "~/.config/solana/id.json",
"--network", "mainnet-beta"]
}
}
}
{
"mcpServers": {
"kraph": {
"command": "npx",
"args": ["-y", "@kraph/mcp-stdio",
"--keypair", "~/.config/solana/id.json",
"--network", "mainnet-beta"]
}
}
}
{
"mcpServers": {
"kraph": {
"command": "npx",
"args": ["-y", "@kraph/mcp-stdio",
"--keypair", "~/.config/solana/id.json",
"--network", "mainnet-beta"]
}
}
}
$ claude mcp add --transport http kraph https://api.kraph.com/mcp
{
"mcpServers": {
"kraph": {
"url": "https://api.kraph.com/mcp"
}
}
}
{
"mcpServers": {
"kraph": {
"url": "https://api.kraph.com/mcp"
}
}
}
{
"mcpServers": {
"kraph": {
"serverUrl": "https://api.kraph.com/mcp"
}
}
}
$ claude mcp add --transport http kraph https://api-mainnet.kraph.com/mcp
{
"mcpServers": {
"kraph": {
"url": "https://api-mainnet.kraph.com/mcp"
}
}
}
{
"mcpServers": {
"kraph": {
"url": "https://api-mainnet.kraph.com/mcp"
}
}
}
{
"mcpServers": {
"kraph": {
"serverUrl": "https://api-mainnet.kraph.com/mcp"
}
}
}
# core skill — handles oauth + pins the bearer into mcp config
git clone https://github.com/piske-alex/kraph-skill.git \
~/.claude/skills/kraph
chmod +x ~/.claude/skills/kraph/scripts/*.sh
# optional: email skill (send / receive at @kraph.com via mcp tools)
git clone https://github.com/piske-alex/kraph-email-skill.git \
~/.claude/skills/kraph-email
# macOS / Linux
git clone https://github.com/piske-alex/kraph-skill.git \
~/.claude/skills/kraph
chmod +x ~/.claude/skills/kraph/scripts/*.sh
# optional: email skill
git clone https://github.com/piske-alex/kraph-email-skill.git \
~/.claude/skills/kraph-email
%USERPROFILE%\.claude\skills\kraph
Kraph authenticates via your Solana wallet, not a cloud billing profile. Two modes, both handled automatically:
kraph_auth_challenge
→ sign → kraph_auth_verify. Session token
valid for 30 minutes.
Paid tool calls settle via x402 on Solana.
The gateway returns 402 Payment Required with
the tool's price in USDC; your client's x402-fetch wrapper signs and
retries automatically. The result is metered infrastructure without a
card processor sitting between the agent and the app it is trying to ship.
Kraph runs the unmodified official Supabase Docker stack under the hood — same Postgres 15, same PostgREST, same GoTrue auth, same Realtime, same Storage API, same Edge Runtime (Deno/TypeScript), same JWT format, same Studio dashboard.
That means the full compat surface works out of the box:
@supabase/supabase-js,
PostgREST clients, supabase-py, supabase-dart, Studio, the
supabase CLI, the Supabase Edge Functions
runtime, the S3-compatible Storage API, standard
ENV-var semantics for functions,
pg_dump / pg_restore,
and every RLS policy you've already written.
Migrating an existing full-stack app is a few env-var changes:
kraph_provision → get a new URL + anon key + service role keypg_dump source db → pg_restore into the new instancekraph_deploy_function your edge functions · kraph_set_env for secrets · upload buckets to StorageSUPABASE_URL / SUPABASE_ANON_KEY and redeploy (or kraph_pin_frontend the built static bundle to IPFS)Kraph is an independent open-source project, not affiliated with or endorsed by Supabase Inc. — but because it orchestrates the same open-source components those projects use, the SDKs work unchanged. For ad-hoc agent use, no migration at all: Kraph just sits alongside your existing infra as another tool.
Start from an AI app, assistant, or automation you want in production. Use Forge for browser iteration or your own repo/tooling, then define triggers, guardrails, and data boundaries.
Connect calendars, email, CRMs, internal APIs, and data stores. Keep provider keys in encrypted env vars with least privilege instead of prompt text.
Through MCP, Kraph provisions a full Supabase-compatible stack (Postgres, Auth, Realtime, Storage, Functions, Studio, API gateway) plus IPFS hooks. You get URLs, keys, and runtime without stitching vendors; paid tools settle via x402 on Solana.
Track what changed and what you paid for using Postgres state, function logs, stored artifacts, payment feed updates, and node health. Replication remains encrypted so replica storage carries ciphertext, not raw workload state.
Start free on Devnet. Scale to production on Mainnet.
Devnet: Free USDC faucet. No card. No KYC. Perfect for building fast.
Mainnet: Real Solana USDC payments. Hardware-attested nodes. Encrypted everything.
Pay with devnet USDC from the faucet. Any available node. Mock TEE. Ephemeral instances. No card, no KYC, low-risk playground.
@supabase/supabase-jsReal USDC on Solana mainnet. TEE-verified nodes only — eligible nodes prove they run inside an AMD SEV-SNP enclave before the gateway places production workloads on them.
@supabase/supabase-jskraph_provision $0.10
kraph_extend $0.05
kraph_query $0.001
kraph_set_env $0.005
If pricing changes, we will announce it clearly before it applies. Meter coverage may evolve as the network matures.
Three steps, same tooling. Your app, your keys, your data.
pg_dump your devnet instance and bundle storage artifactsKRAPH_SOLANA_NETWORK=solana:mainnet-beta and run kraph_provisionpg_restore + kraph_deploy_function + kraph_set_envFunction env vars are stored as ciphertext on node disk; on SEV-SNP mainnet placement plaintext materializes only during apply in the attested runtime path.
WAL segments leave the primary encrypted, and replica nodes retain ciphertext only, not application plaintext.
Eligible mainnet placement can run on AMD SEV-SNP hardware with fresh measurement checks before placement.
devnet is not confidential - use mainnet and attested nodes for stronger confidentiality goals.
Kraph is growing an independent operator network that supplies compute, storage, and bandwidth for customer workloads.
Verified infrastructure capacity: compute, storage, bandwidth, uptime, region coverage, and optional attested hardware.
Approved operators are paid monthly in USDC as vendor payments for delivered services.
Onboarding may require identity checks, tax documentation, and service-level agreements. Share region, hardware profile, and SEV-SNP readiness.
Kraph covers the same shipping loop (frontend + backend + auth + data), then adds Forge + MCP, x402 per-call metering, independent operators, and confidentiality controls for production paths. It is an independent project built around compatible open-source components.
Forge is Kraph’s in-browser AI builder for full-stack apps. You iterate on UI + logic while targeting the same Postgres/Auth/Storage/Functions stack provisioned by the network. Open it at forge.kraph.com/build.
Kraph is not Supabase, but it is Supabase-compatible by orchestrating the same open-source components many teams already use. The differentiation is the bundle: AI builder + agent provisioning + stablecoin-metered tool calls + encrypted replication + decentralized placement + attested hardware options.
Kraph combines builder flow with production backend primitives: Postgres, auth, realtime, storage, edge functions, encrypted secrets, optional x402 metering via MCP, encrypted replication, and independent node supply.
Secrets are encrypted at rest on nodes. On mainnet SEV-SNP placement, plaintext is intended to exist only in attested runtime paths during apply; on devnet, assume operators could observe brief decrypt windows. The gateway remains part of today’s trust boundary for orchestration and some auth/payment flows; see the whitepaper.
Forge uses a built-in assistant today. Coming soon, you can choose your model (Claude, Codex, Gemini, or compatible endpoints) inside Forge.
For backend integrations, keep provider keys in function-scoped secrets via kraph_set_env.
Store them in function-scoped env vars with kraph_set_env (encrypted at rest). On mainnet attested placement, plaintext exists only briefly in runtime apply paths.
Continue least-privilege practices: rotate keys, scope tools, and audit agent access.
Yes. Kraph is a backend/hosting layer: connect to provisioned URLs + keys. Typical flow is kraph_provision through MCP or Forge-first, then swap env vars/endpoints like any Supabase-shaped project.
Env rows are stored encrypted at rest and applied at runtime. Mainnet attested placement reduces host-memory exposure; devnet should be treated as non-confidential.
kraph_list_env returns key fingerprints by default; include values only when explicitly requested.
Solana provides wallet identity, low-cost USDC settlement, and programmable registry rails so agents can pay one infrastructure action at a time via x402.
Infrastructure is supplied by independent nodes. Kraph coordinates placement, payment, encrypted replication, and attestation checks while keeping a familiar Postgres/Supabase-shaped developer surface.
Kraph is not a distributed database. Each workload gets a single primary Postgres instance; decentralization applies to placement, settlement, and encrypted replication/backups.
Encrypted WAL segments replicate to multiple nodes. If a primary fails, recovery replays from encrypted backup on reassigned infrastructure.
Provisioning is designed for fast startup versus traditional hosted project bootstraps, and ongoing query latency is whatever the underlying Postgres + API path deliver on selected nodes.
Access is wallet-authenticated instead of card-account first. Billing identity and workload confidentiality are separate layers; confidentiality depends on encryption + placement tier.
On attested mainnet placement, host visibility is reduced by hardware memory encryption plus measurement checks before placement. On devnet, assume operators may inspect runtime state.
Developers using MCP today use wallets (or Privy) for x402 settlement. End-user product experiences may abstract wallet handling over time.
Approved operators receive USDC vendor payments for delivered infrastructure under service terms and compliance checks.