Security posture
What we hide, we cannot defend.
So we hide nothing.
The full security model of Asylia - updated as the surface evolves. Last reviewed by the maintainers on Apr 27, 2026.
01 · Threat model
What Asylia protects against.
And, just as importantly, what it does not.
Asylia is built for the three attacks a serious Bitcoin owner actually worries about: a single hardware device compromise, a compromised operator machine, and a compromised Asylia service tier. The multisig quorum addresses the first two; the hardware isolation model addresses the third.
Out of scope: a nation-state physical-coercion attack on a majority of your signers, the collapse of the Bitcoin consensus layer, and vulnerabilities inside the hardware devices themselves. We trust the hardware manufacturers secure elements the same way the rest of the industry does - and we show our work in hw-trezor and hw-ledger.
02 · Policy
Why only P2WSH multisig.
One script, narrow surface, zero policy ambiguity.
Asylia is native-SegWit P2WSH multisig only. Every vault is a wsh(sortedmulti(N, key1, ..., keyN)) descriptor - the single policy reviewed, implemented, and run in production across Sparrow, Caravan, Unchained, and Bitcoin Core since 2020.
The only policy we ship
wsh(sortedmulti(N, xpubKey1, …, xpubKeyN))
Narrowing to one script means the inherited attack surface is BIP-143 signing rules, BIP-48 derivation, and bech32 encoding - specifications that have been stable, reviewed, and deployed for years. Anything outside that envelope is explicitly refused on import.
"Every script you support is a surface you have to defend."
— The Asylia policy charter
03 · Hardware
Keys never leave the device.
PSBTs travel, signatures travel, private material does not.
Asylia exchanges unsigned PSBTs with each hardware wallet and waits for a signed PSBT in return. The browser never sees a private key, the server never stores one, and the seed phrase stays on the device where it was generated.
Current support: Trezor Safe 3, Model T, and Safe 5 for full register + sign flows; Ledger Nano X and Nano S Plus for full register + sign flows. No other wallets are currently wired. BitBox02, Coldcard, and Jade are on the roadmap, each gated on the same signing-model review.
04 · Custody
Non-custodial by design.
Asylia is a view onto your multisig policy, not a container for your coins.
Email OTP through Supabase gives you a portable account for watch-only state across browsers and machines. The account stores public descriptors, historical balances, and UI preferences - never private keys, signed transactions, or seed material. Deleting the account wipes the watch-only state; your on-chain funds are untouched because Asylia never held them.
The same policy is visible in every export. Point Sparrow or Bitcoin Core at the exact same descriptor and you see the same UTXO set. Asylia is replaceable. That is the point.
05 · Transparency
Open source core.
Five MIT-licensed packages carry every Bitcoin-touching operation.
The wallet application is proprietary, but the Bitcoin surface is not. Every package that performs a cryptographic operation or touches a hardware device ships under MIT: btc-core for descriptors, derivation and PSBT assembly, blockchain-data-btc for chain and mempool reads, hw-trezor and hw-ledger for hardware transports, and shared-types for the domain contract.
06 · Licensing
MIT where it matters.
A clear boundary between the open primitives and the commercial product.
The MIT boundary is drawn on purpose: the primitives your money depends on are reviewable and forkable under MIT. The marketing site, wallet app chrome, and product UI are proprietary so we can operate the service sustainably. If the company goes away, the open-source packages keep your keys reachable from any other wsh(sortedmulti) tool.
07 · Audits
Audit status.
Where we are today, what we are working towards, and what you can already verify yourself.
No external audit has been completed yet. We are in the planning stage with two reputable Bitcoin-native audit firms, scoping a btc-core + hardware-transport review as the first pass. When an audit lands, this section will link to the report and any findings + fixes, unredacted.
In the meantime, the MIT packages are yours to read. The policy decision to only support wsh(sortedmulti) means most of the risky surface - policy parsing and script construction - is directly verifiable against the Bitcoin Core reference.
08 · Disclosure
Responsible disclosure.
If you find a problem, tell us before the world.
Email [email protected] with a description of the issue, reproduction steps, and a suggested severity. We acknowledge within 48 hours and aim to ship a fix or transparent mitigation within 14 days. Critical issues get a dedicated coordination channel; we credit every reporter unless you ask us not to.
A bug bounty program will launch alongside the first external audit.
Still reading?
Then you are the kind of person Asylia is built for. Open the wallet and create your first multisig vault - the rest of the trust is built by doing.