Skip to main content
There is no customer data on our systems. Keys, signed transactions, and the audit trail all live on the operator’s infrastructure. That is a categorical architectural guarantee, not a policy promise — and it is the starting point for every other question on this page.

Keys Isolation

No WalletSuite employee can access keys, signed transactions, or the audit trail in a self-hosted deployment.
  • Keys are generated inside the OWS vault on the customer infrastructure. They never leave.
  • Signing happens inside OWS, on the customer infrastructure, against a key that exists in decrypted form only for the duration of the signing call.
  • Audit receipts are appended to a JSONL file on the customer disk.
We never see any of it. No log forwarding, no telemetry on key use, no server-side record of signed payloads. The backend API sees chain queries and transaction preparation requests — public blockchain data and the address involved. It cannot access signatures, mnemonics, or vault contents. The Trust Model enumerates what each component can access.

Data Residency

The audit trail, OWS vault, and signed payloads exist only on customer infrastructure — any cloud, on-prem, bare metal, or edge environment the customer chooses. There is no “WalletSuite copy.” Whatever network boundary a deployment sits behind, that is where this material stays. The WalletSuite backend API serves public chain data: balances, fees, metadata, unsigned transaction payloads. Residency requirements that apply to operational secrets or signing material are satisfied by the fact that those never leave customer infrastructure. Requirements that apply to public chain data are satisfied by the fact that it is public.

Deployment Modes

Today, the only deployment mode is the self-hosted MCP server, which ships with the OWS vault built in. Everything on this page assumes that mode. The “no customer data on our systems” claim holds categorically because there is no other mode. A hosted offering is on the roadmap. When it ships, customers choose one of two modes: fully self-hosted (today’s deployment — the server and vault run on customer infrastructure) or fully hosted (the server and vault both run on WalletSuite infrastructure, with signing inside a hardware-attested enclave).

Band Filtering as Prompt-Injection Defense

Band filtering is also a prompt-injection defense — enforced at the tool-visibility layer. Tools outside the active band are never registered with the MCP client. They do not appear in tools/list, do not have a callable handler, and cannot be discovered through any in-session negotiation. An agent compromised by a malicious prompt — a poisoned search result, a hostile tool output from another server, a user instruction that was actually an injected command — cannot call a tool that the client does not know exists. It cannot invent send_transaction if broadcast is outside its band. The enforcement point is the tool schema itself, not a runtime permission check. Bands are resolved once, at server startup, and reflected in the tools/list response the LLM receives. A model cannot reason around a tool that was never surfaced. See Band Filtering for the band hierarchy and configuration.

Verification Path

  1. ArchitectureSecurity Overview. Trust boundary, defense in depth, attack model.
  2. Key lifecycleKey Management. Vault encryption, BIP-39/44 derivation, memory hygiene.
  3. Audit trailAudit Trail. Receipt schema, hash chain, redaction model.
  4. Build provenanceBuild & Supply Chain. Signed releases, runtime response validation, secret boundary.
  5. SDK source — public at github.com/walletsuite.

Incident Response

If you find a vulnerability, security@walletsuite.io is the canonical contact. The Responsible Disclosure page documents acknowledgment SLAs, severity definitions, and scope. For operational incidents on a customer deployment, the audit trail is the starting point. The hash chain lets an operator prove, after the fact, that no entries were inserted, modified, or removed. Exporting the trail to a SIEM preserves this property across longer retention windows than a single host.

Certifications Roadmap

Formal certifications are on the plan for procurement readiness. They do not change the architectural guarantees above.
CertificationStatus
SOC 2 Type IIPlanned — 2026
CCSS Level 2Planned
Independent penetration testIn progress
Auditors and target quarters will be published once engagements are signed. Until then, the architecture is the proof.