Key security: AWS Nitro Enclaves
Private key material never exists in plaintext outside of a hardware-isolated execution environment. Sequence uses AWS Nitro Enclaves, a hardware-enforced isolation model where:- The enclave runs in a separate memory space, invisible to the host OS.
- No SSH access, no persistent storage, no network interface (except a controlled virtual socket).
- Code running in the enclave is verified against a known measurement (EIF hash) before it can decrypt key material.
- Sequence operators cannot access user keys, even with root access to the host machine.
Identity Instrument
Authentication and session attestation are handled by the Identity Instrument, a service running inside a Nitro Enclave. Its responsibilities:- Verify the user’s identity via OAuth (Google, Apple) or OTP.
- Bind the verified identity to a device Auth Key.
- Issue a signed session attestation: a cryptographic proof that the session key belongs to the verified identity.
Merkleized wallet configuration
The wallet’s onchain state is a single Merkle root: a compact commitment to the full configuration including:- Authorized signers (passkeys, session keys, recovery keys)
- Smart session rules (explicit permissions)
- Recovery configuration
Guard Firewall
The Guard Firewall is an optional transaction review layer that runs before any transaction reaches the chain. It can be configured to:- Block transactions to non-allowlisted contract addresses.
- Flag transfers exceeding configurable thresholds for review.
- Reject transactions that violate explicit session rules before they reach the relayer.
Non-custodial guarantee
Neither Sequence nor Polygon can unilaterally move user funds. The key security properties that enforce this:- User keys are sharded using Shamir’s Secret Sharing across multiple geographically distributed remote key holders. No single entity, including Sequence, holds a complete key.
- The signing enclave requires a valid session attestation from the Identity Instrument to decrypt and use any key shard.
- Session attestations are scoped to a specific app domain and expire. A compromised attestation cannot be reused by a different app or after expiry.
Contract audits
The wallet contracts have been audited by independent security firms. Audit reports are available in the Sequence technical references.Summary
| Property | Implementation |
|---|---|
| Key storage | AWS Nitro Enclaves, never plaintext |
| Identity verification | Enclave-bound Identity Instrument |
| Onchain state | Merkleized configuration, single root per wallet |
| Cross-chain | Same root, same wallet on all EVM chains |
| Transaction policy | Guard Firewall (configurable) |
| Custody | Shamir’s Secret Sharing, no single-party control |