Complete infrastructure platform CLI: - Container runtime (systemd-nspawn) - VoltVisor VMs (Neutron Stardust / QEMU) - Stellarium CAS (content-addressed storage) - ORAS Registry - GitOps integration - Landlock LSM security - Compose orchestration - Mesh networking Copyright (c) Armored Gates LLC. All rights reserved. Licensed under AGPSL v5.0
Volt Platform
Comprehensive virtualization extending Voltainer into the future of computing.
No hypervisor. Native kernel isolation. Extreme density.
Vision
Volt Platform extends Voltainer's revolutionary container technology into full virtualization — addressing every computing need while maintaining security, efficiency, and elegance.
| Workload | Image | Density | Boot Time |
|---|---|---|---|
| Servers | volt/server |
50,000+ | <200ms |
| Databases | volt/server-db |
20,000+ | <300ms |
| Development | volt/dev |
10,000+ | <400ms |
| Desktop VDI | volt/desktop-* |
2,000+ | <600ms |
| Edge/IoT | volt/edge |
100,000+ | <100ms |
| Kubernetes | volt/k8s-node |
30,000+ | <200ms |
Quick Start
# Install
curl -fsSL https://get.voltvisor.io | sh
# Create a server VM
volt vm create my-server --image volt/server --memory 256M
# Start it
volt vm start my-server
# SSH in
volt vm ssh my-server
# Create a desktop VM with ODE
volt desktop create my-desktop --image volt/desktop-productivity
# Connect via browser
volt desktop connect my-desktop
Architecture
┌─────────────────────────────────────────────────────────────┐
│ Your Application │
├─────────────────────────────────────────────────────────────┤
│ Volt Runtime │
│ ┌──────────┐ ┌──────────┐ ┌──────────┐ ┌──────────┐ │
│ │ TinyVol │ │ Kernel │ │ SystemD │ │ ODE │ │
│ │Filesystem│ │ Pool │ │ Isolate │ │ Display │ │
│ └──────────┘ └──────────┘ └──────────┘ └──────────┘ │
│ ┌──────────┐ ┌──────────┐ ┌──────────┐ ┌──────────┐ │
│ │ Landlock │ │ Seccomp │ │Cgroups v2│ │Namespaces│ │
│ └──────────┘ └──────────┘ └──────────┘ └──────────┘ │
├─────────────────────────────────────────────────────────────┤
│ Linux Kernel │
│ (No Hypervisor) │
└─────────────────────────────────────────────────────────────┘
Why No Hypervisor?
Hypervisors are attack surface, not protection:
- VMware ESXi: CVE-2024-37085 (RCE) — actively exploited
- Xen: XSA-* (multiple critical)
- QEMU/KVM: Escape vulnerabilities
- Hyper-V: CVE-2024-* (multiple)
Volt uses native Linux kernel isolation:
- Landlock — Filesystem access control
- Seccomp — Syscall filtering
- Cgroups v2 — Resource limits
- Namespaces — Process/network isolation
- SystemD — Lifecycle management
Battle-tested, open source, audited.
Kernel Profiles
| Profile | Size | Boot | Use Case |
|---|---|---|---|
kernel-server |
30MB | <200ms | Headless servers |
kernel-desktop |
60MB | <400ms | Interactive + ODE |
kernel-rt |
50MB | <300ms | Real-time, video |
kernel-minimal |
15MB | <100ms | Edge, appliances |
kernel-dev |
80MB | <500ms | Debugging, eBPF |
ODE Profiles (Remote Display)
| Profile | Bandwidth | Latency | Use Case |
|---|---|---|---|
terminal |
500 Kbps | 30ms | CLI, SSH replacement |
office |
2 Mbps | 54ms | Productivity apps |
creative |
8 Mbps | 40ms | Design, color-critical |
video |
25 Mbps | 20ms | Video editing |
gaming |
30 Mbps | 16ms | Games, 120fps |
Voltainer Integration
Volt extends Voltainer — it doesn't replace it:
- Same TinyVol filesystem format
- Same cryptographic verification
- Same ArmoredLedger attestations
- Same SBOM/CVE policies
- ODE works for both containers and VMs
Documentation
License
Copyright 2026 ArmoredGate LLC. All rights reserved.
Links
- Website: https://voltvisor.io
- Voltainer: https://voltainer.dev
- ODE: https://armoredgate.com/ode
- ArmoredLedger: https://armoredgate.com/ledger
Description
Languages
Go
91%
Shell
8.6%
Makefile
0.4%