Forge
In-browser AI builder: describe what you want, iterate on UI and logic, and ship onto the same hosted stack.
// confidential-oriented hosting · supabase-shaped stack
A secure all-in-one cloud for AI apps and agents.
Postgres, Auth, Storage, Functions, and IPFS - provisioned per project. Secrets are encrypted at rest, replicas store only encrypted WAL, and eligible mainnet placement can run on AMD SEV-SNP attested nodes. Build with Forge or provision via MCP on the same stack.
Under the hood: gateway placement, x402 settlement, encrypted replication, and attested nodes when you choose mainnet-tier hosting.
Kraph is a secure all-in-one cloud for AI apps and agents: you get a real backend (database, auth, APIs, storage, functions, logs, static hosting) with encrypted secrets, optional x402 USDC metering, and a network of independent nodes with hardware-attested capacity for production.
In-browser AI builder: describe what you want, iterate on UI and logic, and ship onto the same hosted stack.
Postgres, Auth, Realtime, Storage, Edge Functions, Studio, IPFS hooks — the pieces you expect from a modern backend, orchestrated per project.
Agents and developer tools call kraph_provision and related tools to create infrastructure programmatically, with per-call settlement via x402 when applicable.
Independent operators supply compute and storage; the protocol handles placement, payments, encrypted WAL replication, and attestation checks.
Concrete outputs, not platform abstractions: Postgres, Auth, Storage, Edge Functions, Realtime, IPFS, and encrypted env vars for third-party keys. Build with Forge or provision from code via MCP.
Postgres + Realtime + Storage for durable agent memory, files, and session state — same @supabase/supabase-js patterns you already use.
Deno edge functions next to your data, with encrypted env vars for API keys and connector credentials.
Pin static frontends to content-addressed storage so each agent can have a shareable URL or embed alongside its API.
Optional wallet identity and x402 USDC on Solana meter infrastructure per tool call — no card on file when you deploy via MCP.
Independent nodes host workloads with encrypted WAL replication; mainnet-tier placement can use AMD SEV-SNP attested hardware.
Inbound and outbound mail for auth flows, digests, notifications, and support — live for allowlisted team mailboxes via MCP today; broader self-serve access is planned as packaging matures.
Forge is Kraph’s in-browser builder: describe what you want, iterate on UI and logic, and ship to the same Postgres + APIs + functions + storage + encrypted env surface the network provisions. It is for teams that want a hosted builder instead of wiring everything from an external LLM IDE first.
Built-in assistant works today. Coming soon: choose your model in Forge - Claude, GPT/Codex, Gemini, or compatible endpoints - so you can keep the same build flow while selecting the model you trust.
Design UI and flow quickly, then deploy without switching stacks.
Build path and MCP path land on the same backend primitives.
Pick Claude, Codex, Gemini, or compatible endpoints; built-in assistant remains available.
Prefer a hosted builder? Start with Forge. Prefer your own editor and agents? Use MCP here.
Today, MCP is the developer path: authenticate with a Solana wallet, call kraph_provision, and connect your app to returned URLs and keys.
/mcp setup is awkward.claude mcp add kraph -- npx -y @kraph/mcp-stdio \
--keypair ~/.config/solana/id.json \
--network devnet
{
"mcpServers": {
"kraph": {
"command": "npx",
"args": ["-y", "@kraph/mcp-stdio",
"--keypair", "~/.config/solana/id.json",
"--network", "devnet"]
}
}
}
%APPDATA%\Claude\claude_desktop_config.json
~/Library/Application Support/Claude/claude_desktop_config.json
{
"mcpServers": {
"kraph": {
"command": "npx",
"args": ["-y", "@kraph/mcp-stdio",
"--keypair", "~/.config/solana/id.json",
"--network", "devnet"]
}
}
}
{
"mcpServers": {
"kraph": {
"command": "npx",
"args": ["-y", "@kraph/mcp-stdio",
"--keypair", "~/.config/solana/id.json",
"--network", "devnet"]
}
}
}
claude mcp add kraph -- npx -y @kraph/mcp-stdio \
--keypair ~/.config/solana/id.json \
--network mainnet-beta
{
"mcpServers": {
"kraph": {
"command": "npx",
"args": ["-y", "@kraph/mcp-stdio",
"--keypair", "~/.config/solana/id.json",
"--network", "mainnet-beta"]
}
}
}
{
"mcpServers": {
"kraph": {
"command": "npx",
"args": ["-y", "@kraph/mcp-stdio",
"--keypair", "~/.config/solana/id.json",
"--network", "mainnet-beta"]
}
}
}
{
"mcpServers": {
"kraph": {
"command": "npx",
"args": ["-y", "@kraph/mcp-stdio",
"--keypair", "~/.config/solana/id.json",
"--network", "mainnet-beta"]
}
}
}
$ claude mcp add --transport http kraph https://api.kraph.com/mcp
{
"mcpServers": {
"kraph": {
"url": "https://api.kraph.com/mcp"
}
}
}
{
"mcpServers": {
"kraph": {
"url": "https://api.kraph.com/mcp"
}
}
}
{
"mcpServers": {
"kraph": {
"serverUrl": "https://api.kraph.com/mcp"
}
}
}
$ claude mcp add --transport http kraph https://api-mainnet.kraph.com/mcp
{
"mcpServers": {
"kraph": {
"url": "https://api-mainnet.kraph.com/mcp"
}
}
}
{
"mcpServers": {
"kraph": {
"url": "https://api-mainnet.kraph.com/mcp"
}
}
}
{
"mcpServers": {
"kraph": {
"serverUrl": "https://api-mainnet.kraph.com/mcp"
}
}
}
# core skill — handles oauth + pins the bearer into mcp config
git clone https://github.com/piske-alex/kraph-skill.git \
~/.claude/skills/kraph
chmod +x ~/.claude/skills/kraph/scripts/*.sh
# optional: email skill (send / receive at @kraph.com via mcp tools)
git clone https://github.com/piske-alex/kraph-email-skill.git \
~/.claude/skills/kraph-email
# macOS / Linux
git clone https://github.com/piske-alex/kraph-skill.git \
~/.claude/skills/kraph
chmod +x ~/.claude/skills/kraph/scripts/*.sh
# optional: email skill
git clone https://github.com/piske-alex/kraph-email-skill.git \
~/.claude/skills/kraph-email
%USERPROFILE%\.claude\skills\kraph
Kraph authenticates via your Solana wallet, not a cloud billing profile. Two modes, both handled automatically:
kraph_auth_challenge
→ sign → kraph_auth_verify. Session token
valid for 30 minutes.
Paid tool calls settle via x402 on Solana.
The gateway returns 402 Payment Required with
the tool's price in USDC; your client's x402-fetch wrapper signs and
retries automatically. The result is metered infrastructure without a
card processor sitting between the agent and the app it is trying to ship.
Kraph runs the unmodified official Supabase Docker stack under the hood — same Postgres 15, same PostgREST, same GoTrue auth, same Realtime, same Storage API, same Edge Runtime (Deno/TypeScript), same JWT format, same Studio dashboard.
That means the full compat surface works out of the box:
@supabase/supabase-js,
PostgREST clients, supabase-py, supabase-dart, Studio, the
supabase CLI, the Supabase Edge Functions
runtime, the S3-compatible Storage API, standard
ENV-var semantics for functions,
pg_dump / pg_restore,
and every RLS policy you've already written.
Migrating an existing full-stack app is a few env-var changes:
kraph_provision → get a new URL + anon key + service role keypg_dump source db → pg_restore into the new instancekraph_deploy_function your edge functions · kraph_set_env for secrets · upload buckets to StorageSUPABASE_URL / SUPABASE_ANON_KEY and redeploy (or kraph_pin_frontend the built static bundle to IPFS)Kraph is an independent open-source project, not affiliated with or endorsed by Supabase Inc. — but because it orchestrates the same open-source components those projects use, the SDKs work unchanged. For ad-hoc agent use, no migration at all: Kraph just sits alongside your existing infra as another tool.
Start from an AI app, assistant, or automation you want in production. Use Forge for browser iteration or your own repo/tooling, then define triggers, guardrails, and data boundaries.
Connect calendars, email, CRMs, internal APIs, and data stores. Keep provider keys in encrypted env vars with least privilege instead of prompt text.
Through MCP, Kraph provisions a full Supabase-compatible stack (Postgres, Auth, Realtime, Storage, Functions, Studio, API gateway) plus IPFS hooks. You get URLs, keys, and runtime without stitching vendors; paid tools settle via x402 on Solana.
Track what changed and what you paid for using Postgres state, function logs, stored artifacts, payment feed updates, and node health. Replication remains encrypted so replica storage carries ciphertext, not raw workload state.
When you connect via MCP, you choose devnet (faucet USDC, fast iteration, mock TEE) or mainnet (real USDC, SEV-SNP attested nodes for eligible placement). Forge and your app use the same stack either way; billing and trust assumptions differ.
Pay with devnet USDC from the faucet. Any available node. Mock TEE. Ephemeral instances. No card, no KYC, low-risk playground.
@supabase/supabase-jsReal USDC on Solana mainnet. TEE-verified nodes only — eligible nodes prove they run inside an AMD SEV-SNP enclave before the gateway places production workloads on them.
@supabase/supabase-jskraph_provision $0.10
kraph_extend $0.05
kraph_query $0.001
kraph_set_env $0.005
If pricing changes, we will announce it clearly before it applies. Meter coverage may evolve as the network matures.
Three steps, same tooling. Your app, your keys, your data.
pg_dump your devnet instance and bundle storage artifactsKRAPH_SOLANA_NETWORK=solana:mainnet-beta and run kraph_provisionpg_restore + kraph_deploy_function + kraph_set_envFunction env vars are stored as ciphertext on node disk; on SEV-SNP mainnet placement plaintext materializes only during apply in the attested runtime path.
WAL segments leave the primary encrypted, and replica nodes retain ciphertext only, not application plaintext.
Eligible mainnet placement can run on AMD SEV-SNP hardware with fresh measurement checks before placement.
devnet is not confidential - use mainnet and attested nodes for stronger confidentiality goals.
Kraph is growing an independent operator network that supplies compute, storage, and bandwidth for customer workloads.
Verified infrastructure capacity: compute, storage, bandwidth, uptime, region coverage, and optional attested hardware.
Approved operators are paid monthly in USDC as vendor payments for delivered services.
Onboarding may require identity checks, tax documentation, and service-level agreements. Share region, hardware profile, and SEV-SNP readiness.
Kraph covers the same shipping loop (frontend + backend + auth + data), then adds Forge + MCP, x402 per-call metering, independent operators, and confidentiality controls for production paths. It is an independent project built around compatible open-source components.
Forge is Kraph’s in-browser AI builder for full-stack apps. You iterate on UI + logic while targeting the same Postgres/Auth/Storage/Functions stack provisioned by the network. Open it at forge.kraph.com/build.
Kraph is not Supabase, but it is Supabase-compatible by orchestrating the same open-source components many teams already use. The differentiation is the bundle: AI builder + agent provisioning + stablecoin-metered tool calls + encrypted replication + decentralized placement + attested hardware options.
Kraph combines builder flow with production backend primitives: Postgres, auth, realtime, storage, edge functions, encrypted secrets, optional x402 metering via MCP, encrypted replication, and independent node supply.
Secrets are encrypted at rest on nodes. On mainnet SEV-SNP placement, plaintext is intended to exist only in attested runtime paths during apply; on devnet, assume operators could observe brief decrypt windows. The gateway remains part of today’s trust boundary for orchestration and some auth/payment flows; see the whitepaper.
Forge uses a built-in assistant today. Coming soon, you can choose your model (Claude, Codex, Gemini, or compatible endpoints) inside Forge.
For backend integrations, keep provider keys in function-scoped secrets via kraph_set_env.
Store them in function-scoped env vars with kraph_set_env (encrypted at rest). On mainnet attested placement, plaintext exists only briefly in runtime apply paths.
Continue least-privilege practices: rotate keys, scope tools, and audit agent access.
Yes. Kraph is a backend/hosting layer: connect to provisioned URLs + keys. Typical flow is kraph_provision through MCP or Forge-first, then swap env vars/endpoints like any Supabase-shaped project.
Env rows are stored encrypted at rest and applied at runtime. Mainnet attested placement reduces host-memory exposure; devnet should be treated as non-confidential.
kraph_list_env returns key fingerprints by default; include values only when explicitly requested.
Solana provides wallet identity, low-cost USDC settlement, and programmable registry rails so agents can pay one infrastructure action at a time via x402.
Infrastructure is supplied by independent nodes. Kraph coordinates placement, payment, encrypted replication, and attestation checks while keeping a familiar Postgres/Supabase-shaped developer surface.
Kraph is not a distributed database. Each workload gets a single primary Postgres instance; decentralization applies to placement, settlement, and encrypted replication/backups.
Encrypted WAL segments replicate to multiple nodes. If a primary fails, recovery replays from encrypted backup on reassigned infrastructure.
Provisioning is designed for fast startup versus traditional hosted project bootstraps, and ongoing query latency is whatever the underlying Postgres + API path deliver on selected nodes.
Access is wallet-authenticated instead of card-account first. Billing identity and workload confidentiality are separate layers; confidentiality depends on encryption + placement tier.
On attested mainnet placement, host visibility is reduced by hardware memory encryption plus measurement checks before placement. On devnet, assume operators may inspect runtime state.
Developers using MCP today use wallets (or Privy) for x402 settlement. End-user product experiences may abstract wallet handling over time.
Approved operators receive USDC vendor payments for delivered infrastructure under service terms and compliance checks.