DocssecuritySecurity Model

Security Model

A deep dive into how Kairo Guard's architecture protects your crypto at every layer.

7 min read

Security Model

Kairo's security isn't a single feature—it's a layered architecture where multiple protections work together. This document explains each layer, how they interact, and why this design keeps your assets safe.

Security Layers

Kairo provides three distinct layers of protection:

Layer 3: Audit Trail
    ↑ Records every action permanently
Layer 2: Policy Enforcement  
    ↑ Controls what can be signed
Layer 1: Key Protection
    ↑ Prevents unauthorized access to signing capability

An attacker would need to defeat ALL layers to steal your funds. Let's examine each one.

Layer 1: Key Protection (2PC-MPC)

The foundation of Kairo's security is that your complete private key never exists in any single location.

How Key Splitting Works

When you create a Kairo wallet:

  1. Key material is generated in a distributed way
  2. Your device keeps one piece (the "user share")
  3. Kairo's network keeps another piece (the "network share")
  4. Neither piece alone can sign anything

This is called Two-Party Computation Multi-Party Computation (2PC-MPC).

Why This Is Secure

Traditional wallet:

Private Key (one location)
     ↓
Attacker steals it → Funds gone

Kairo wallet:

User Share (your device) + Network Share (Kairo network)
           ↓                         ↓
     Both required to sign
           ↓
Attacker steals one → Still can't sign

For an attacker to sign transactions, they would need to:

  • Compromise your device AND
  • Compromise Kairo's distributed network

This is dramatically harder than traditional single-key attacks.

User Share Protection

Your share is protected by multiple mechanisms:

| Protection | What It Does | |------------|--------------| | Passkey encryption | Key share encrypted with hardware-backed credential | | Biometric requirement | Fingerprint/face required to decrypt | | Secure enclave | Key never leaves device's secure hardware | | No network export | Share never transmitted unencrypted |

Network Share Protection

Kairo's network share is protected by:

| Protection | What It Does | |------------|--------------| | Distributed nodes | Share split across multiple servers | | Geographic distribution | Nodes in different jurisdictions | | Threshold cryptography | Multiple nodes must cooperate | | Continuous rotation | Key shares refreshed regularly |

Layer 2: Policy Enforcement

Even if an attacker somehow obtained both key shares, they still couldn't sign arbitrary transactions. Every signature requires a valid policy receipt.

On-Chain Enforcement

Your policy lives on Sui blockchain as a smart contract. The enforcement happens on-chain, not on your device:

Transaction Request
       ↓
Policy Engine (Sui blockchain)
       ↓
   Checks:
   ✓ Destination in allowlist?
   ✓ Amount within limits?
   ✓ Contract function allowed?
   ✓ Chain permitted?
   ✓ Policy not expired?
       ↓
If all pass → PolicyReceipt minted
       ↓
Receipt required for signing

Why On-Chain Matters

If policy enforcement only happened on your device:

  • Malware could bypass the checks
  • A compromised browser extension could skip validation
  • Attackers could modify the code

With on-chain enforcement:

  • Code is immutable and public
  • Anyone can verify the enforcement logic
  • Device compromise doesn't bypass policy

Receipt Consumption

Policy receipts are one-time use:

  1. Receipt minted when policy approves transaction
  2. Signing uses and consumes the receipt
  3. Receipt is deleted from blockchain
  4. Same receipt can never be reused

This prevents replay attacks where an attacker tries to reuse an old authorization.

The PolicyVault

The PolicyVault is the ultimate gatekeeper. It's a smart contract that:

  1. Validates the receipt matches the signing request
  2. Verifies the receipt is for the correct policy version
  3. Records the intent to prevent double-signing
  4. Only then authorizes the MPC network to sign

No transaction can be signed without passing through the PolicyVault.

Layer 3: Audit Trail

Every signing action creates a permanent, tamper-proof record.

Custody Events

When you sign a transaction, a CustodyEvent is recorded with:

  • What was signed (transaction details)
  • When it was signed (timestamp)
  • Which policy authorized it (receipt reference)
  • The previous event's hash (creates chain)

Hash-Linked Chain

Each event references the previous one through cryptographic hashing:

Event 0 → Event 1 → Event 2 → Event 3
   hash   ←   hash   ←   hash   ←   hash

This means:

  • Events can't be modified (would break the hash chain)
  • Events can't be inserted (would require modifying subsequent hashes)
  • Events can't be deleted (missing link would be obvious)
  • Any tampering is immediately detectable

Verification

Anyone can verify the custody trail:

  1. Fetch the event from Sui
  2. Recompute the hash from event fields
  3. Compare to stored hash
  4. Verify it links to previous event
  5. Continue backwards to verify entire chain

Trust Boundaries

Understanding where you need to trust what:

Fully Trusted

Things that must be secure for the system to work:

| Component | Why You Trust It | |-----------|------------------| | Your device | You physically control it | | Your passkey | Biometric-protected | | Sui blockchain | Byzantine fault tolerant | | Ika MPC network | Threshold cryptography |

Semi-Trusted

Components where on-chain verification provides safety:

| Component | Verification | |-----------|--------------| | Kairo backend | All actions verified on-chain | | Policy evaluation | Results minted as receipts | | Signing authorization | Vault enforces requirements |

Trustless

No trust required—anyone can verify:

| Component | How to Verify | |-----------|---------------| | Policy rules | Read the policy object on Sui | | Receipt validity | Check on-chain state | | Custody trail | Recompute hashes yourself | | Transaction history | Public blockchain data |

What Kairo Does NOT Protect Against

Transparency requires acknowledging limitations:

Device + Passkey Compromise

If an attacker has:

  • Physical access to your device
  • Your biometric (or device PIN)

They can sign transactions that match your policy. Kairo's policy limits the damage, but can't prevent all authorized actions.

Mitigation: Strong biometrics, don't share device PIN, use device lock timeouts.

Policy Misconfiguration

If your policy allows transactions you didn't intend:

  • Overly broad allowlist
  • No spending limits
  • Dangerous selectors allowed

Kairo will approve transactions matching that policy.

Mitigation: Start restrictive, test your policy, review regularly.

User Approval of Malicious Transactions

If you approve a transaction to a malicious address:

  • Even if address is in your allowlist
  • Kairo will sign it

Mitigation: Carefully review transactions, use meaningful names for addresses.

Blockchain-Level Attacks

Kairo can't protect against:

  • Smart contract bugs in protocols you interact with
  • Blockchain consensus failures
  • Oracle manipulation

Mitigation: Only interact with audited protocols, diversify across platforms.

Comparison with Alternatives

How Kairo compares to other security approaches:

vs. Seed Phrase Only

| Aspect | Seed Phrase | Kairo | |--------|-------------|-------| | Key storage | One location | Split between two | | Theft via phishing | Complete loss | Policy limits damage | | Recovery | Hope you backed up | Multiple options | | Audit trail | None | Complete |

vs. Hardware Wallets

| Aspect | Hardware Wallet | Kairo | |--------|-----------------|-------| | Key protection | Hardware isolation | 2PC-MPC split | | Policy enforcement | None | On-chain | | Multi-chain | Often limited | Unified | | Recovery | Seed phrase | Multiple options |

vs. Multi-Signature

| Aspect | Multi-Sig | Kairo | |--------|-----------|-------| | Multiple keys | Yes (multiple locations) | Yes (distributed) | | Policy flexibility | Limited | Extensive | | Chain support | Varies | Unified | | User experience | Coordinate signers | Single approval |

Security Guarantees Summary

Kairo provides these guarantees:

| If This Happens... | You're Protected Because... | |-------------------|----------------------------| | Device stolen | Attacker doesn't have network share | | Kairo servers compromised | Attacker doesn't have your share | | Phishing tricks you | Policy blocks unauthorized destinations | | Malware on device | On-chain policy still enforces rules | | Old receipt reused | Receipts are consumed after use | | Policy tampered | Policy is immutable on-chain | | History questioned | Hash-chain proves integrity |

Next Steps

© 2026 Kairo Guard. All rights reserved.