Polygon’s embedded wallet stack is built on the Sequence smart wallet architecture. This page covers the key security properties relevant to fintechs and financial products building on top of it.Documentation Index
Fetch the complete documentation index at: https://docs.polygon.technology/llms.txt
Use this file to discover all available pages before exploring further.
Key security: AWS Nitro Enclaves
Private key material never exists in plaintext outside of a hardware-isolated execution environment. Sequence uses AWS Nitro Enclaves, a hardware-enforced isolation model where:- The enclave runs in a separate memory space, invisible to the host OS.
- No SSH access, no persistent storage, no network interface (except a controlled virtual socket).
- Code running in the enclave is verified against a known measurement (EIF hash) before it can decrypt key material.
- Sequence operators cannot access user keys, even with root access to the host machine.
Identity Instrument
Authentication and session attestation are handled by the Identity Instrument, a service running inside a Nitro Enclave. Its responsibilities:- Verify the user’s identity via OAuth (Google, Apple) or OTP.
- Bind the verified identity to a device Auth Key.
- Issue a signed session attestation: a cryptographic proof that the session key belongs to the verified identity.
Merkleized wallet configuration
The wallet’s onchain state is a single Merkle root: a compact commitment to the full configuration including:- Authorized signers (passkeys, session keys, recovery keys)
- Smart session rules (explicit permissions)
- Recovery configuration
Guard Firewall
The Guard Firewall is an optional transaction review layer that runs before any transaction reaches the chain. It can be configured to:- Block transactions to non-allowlisted contract addresses.
- Flag transfers exceeding configurable thresholds for review.
- Reject transactions that violate explicit session rules before they reach the relayer.
Non-custodial guarantee
Neither Sequence nor Polygon can unilaterally move user funds. The key security properties that enforce this:- User keys are sharded using Shamir’s Secret Sharing across multiple geographically distributed remote key holders. No single entity, including Sequence, holds a complete key.
- The signing enclave requires a valid session attestation from the Identity Instrument to decrypt and use any key shard.
- Session attestations are scoped to a specific app domain and expire. A compromised attestation cannot be reused by a different app or after expiry.
Contract audits
The wallet contracts have been audited by independent security firms. Audit reports are available in the Sequence technical references.Summary
| Property | Implementation |
|---|---|
| Key storage | AWS Nitro Enclaves, never plaintext |
| Identity verification | Enclave-bound Identity Instrument |
| Onchain state | Merkleized configuration, single root per wallet |
| Cross-chain | Same root, same wallet on all EVM chains |
| Transaction policy | Guard Firewall (configurable) |
| Custody | Shamir’s Secret Sharing, no single-party control |