TARXDocs
⌘Ktarx.com →

Search Docs

Skip to Content
supercomputer

Hosted keys and Supercomputer

Use hosted keys for permissioned Supercomputer calls and keep local-first work separate.

Available nowcriticalUpdated 2026-05-13

Hosted Supercomputer keys are for permissioned hosted execution. They are not required for ordinary local-first use on the Computer.

Key types

Separate identity from hosted compute. A developer identity key can support attribution and local integration. A hosted Supercomputer key controls paid hosted power.

Hosted request

Hosted calls should include an execution policy, privacy tier, project id, and maximum Joules where applicable.

curl https://tarx.com/api/v1/chat/completions \
  -H "Authorization: Bearer $TARX_API_KEY" \
  -H "x-tarx-execution-policy: supercomputer-fast" \
  -H "x-tarx-project-id: launch-app" \
  -H "x-tarx-max-joules: 50000"

Boundary

A hosted key should not make local-private data available to hosted compute unless the request and policy explicitly allow that route.