01Match the checksum we publish
Proves the file you downloaded is byte-identical to what we shipped. Doesn't prove we're trustworthy — that comes next.
$ curl -sO https://killsesh.com/downloads/killsesh-enterprise-v0.1.0.tar.gz
$ curl -s https://killsesh.com/downloads/SHA256SUMS | shasum -a 256 -c
killsesh-enterprise-v0.1.0.tar.gz: OK
02Read the contents BEFORE you run anything
The whole bundle is <100 small text files. No compiled binaries, no obfuscation. Reading it takes 5 minutes.
$ tar -xzf killsesh-enterprise-v0.1.0.tar.gz && cd killsesh-enterprise-deploy
$ cat MANIFEST.txt # every file + size + sha
$ cat docker-compose.enterprise.yml # which services, which ports
$ cat backend/Dockerfile # base image, install steps
$ cat nginx/nginx.enterprise.conf # routing rules
03Find every place the code touches the network
Backend is Python — every outbound call is an explicit import. grep is a complete audit, not a sample.
$ grep -rE "requests\.|httpx\.|urlopen|aiohttp|websocket" backend/app/
backend/app/core/llm/client.py: httpx.post(f"{OLLAMA_BASE_URL}/api/generate", ...)
# expected: ONE line. Goes to your local Ollama. That's it.04Prove it can't phone home
Run with internet access disabled. If the pipeline still works, our zero-egress claim is true.
$ docker compose -f docker-compose.enterprise.yml up -d --build
$ docker network inspect killsesh-enterprise-deploy_default \
| jq '.[0].Containers' # confirm: backend = no internet, only nginx :8080
$ # Or stricter — full air-gap test:
$ docker compose down && docker network create --internal killsesh-airgap
$ docker compose -f docker-compose.enterprise.yml \
--project-name killsesh-airgap up -d