Run
Create VMConnect a wallet, choose a machine, and create a virtual machine in the console.Bench workspaceOpen the injector coding workspace after you install a machine in Console.Diesel injector codingCoding and calibration workflows across live injector families.Documentation
Documentation
Last reviewed:
Security Model
Security posture is built around scoped operator identity, isolated execution, and durable event evidence. The objective is reducing ambiguity during both normal operations and exception handling.
Core Controls
- Wallet-based challenge-response identity for machine actions.
- Isolated VM runtime scope to reduce cross-machine leakage risk.
- Machine-linked trace events for review and incident analysis.
- Network-side payment evidence and timestamped operation context.
Operational Compliance
- Keep service records linked to machine identifiers.
- Use role-specific wallets for operator accountability.
- Retain trace artifacts according to internal quality policy.
- Review ready machine coverage and install routing before release operations.
Incident Readiness
For issue triage, capture session ID, timestamp, operator wallet, selected family/profile, and operation type. This minimum record set materially improves mean-time-to-resolution.

