Security Engine watches malware in real time. System Guardian
predicts failures 48 hours out. AI Doctor explains what's
wrong — all on your own hardware, under your own control.
No credit card · ~30 second install · Air-gap ready
https://console.vloud.app
Security
92
▲ +3
Health
86
▬
Backup
100
▲ +1
Firewall
Strict
●
Resources
CPU
34%
RAM
62%
Disk
48%
Recent events
Scan complete · 0 threats
Backup uploaded · 1.2 GB
SSL expires in 19 days
Deploy succeeded · main
Live scan
Files / sec2,840
Cleared148.3 GB
Quarantined0
What it watches
Six things your server should never miss.
Vloud ships with the Security Engine, System Guardian, and AI
Doctor pre-wired. No agents to install, no SaaS to subscribe to.
Security Engine
Real-time malware detection with ClamAV + YARA + threat-intel
feeds. Uploads are scanned at the gateway; filesystem watchers
catch anything written to disk; suspicious processes are
flagged before they fork.
Inotify-driven scanning
Quarantine with restore guard
Operator-authored signature packs
System Guardian
Predicts disk-full, OOM, runaway-CPU events 48 hours out by
watching long-tail trends, not just thresholds. Surfaces the
fix before the incident.
Trend-based anomaly detection
Per-process resource attribution
Pre-incident notifications
AI Doctor
Pinpoints why a deployment is failing — broken envs, missing
migrations, port conflicts, OOM during build. Explains in
plain English. Fixes only with your approval.
Reads logs, configs, diffs
Suggests targeted fixes
Never auto-runs destructive commands
Fleet Guardian
Cross-host monitoring without a centralized SaaS. Each host
phones home to one of yours; metrics stay inside your
perimeter. Heartbeats, not telemetry pipelines.
Push-only, no inbound ports
Aggregate dashboards across hosts
Alert routing per fleet, per host
Air-gap ready
Offline mode verified against signed monthly mirror bundles.
No internet — engine still runs, signatures still update,
licenses still verify.
Signed monthly bundles
Detached license verification
Reproducible binary builds
Transparent audit
Every license event and every operator action is appended to
a public Merkle tree. Inspect the chain before you trust the
vendor — including us.
Hash-chained audit log
Signed transparency roots
Independent third-party verifiable
How it works
Install. Connect. Operate.
From a fresh server to a fully-armed control panel in three
steps. No kubernetes, no helm, no cloud-vendor lock-in.
01
⬇
Install
One curl-bash on any Ubuntu / Debian host.
The installer downloads the signed binary, verifies the
signature, and provisions systemd in under a minute.
curl -fsSL https://install.vloud.app | bash
02
🔑
Connect
Paste your activation key. Vloud verifies the
license against the signed manifest, opens the console on
port 2500, and pulls down the latest signature feeds.
vloud activate <key>
03
🚀
Operate
Open the console, deploy projects, watch
Security Engine + System Guardian + AI Doctor run on the
bottom-right of every page. That's it.