DocssecurityThreat Model

Threat Model

What attacks Kairo Guard protects against, and the limits of that protection.

8 min read

Threat Model

Understanding what Kairo protects against—and what it doesn't—helps you make informed decisions about your security setup. This document details the threats Kairo addresses and the assumptions underlying that protection.

Threats Kairo Mitigates

Threat: Device Theft

Scenario: Someone steals your phone or laptop with the Kairo extension installed.

Attack: Thief tries to sign transactions using your wallet.

Protection:

  • Your key share is encrypted with your passkey
  • Passkey requires biometric (fingerprint/face) or PIN
  • Without your biometric, the key share can't be decrypted
  • Even if decrypted, they still don't have the network share

Residual risk: If the thief also has your biometric or device PIN, they can sign transactions (but only those allowed by your policy).

Threat: Phishing Attack

Scenario: You click a malicious link that looks like a legitimate dApp.

Attack: Fake site requests you to sign a transaction that drains your wallet.

Protection:

  • Your policy only allows transactions to approved addresses
  • Even if you approve the signing request, it fails if the destination isn't in your allowlist
  • On-chain enforcement means the fake dApp can't bypass the check

Residual risk: If the malicious address is somehow in your allowlist, the transaction will succeed.

Threat: Browser Extension Compromise

Scenario: An attacker injects malicious code into the Kairo extension.

Attack: Modified extension tries to sign unauthorized transactions.

Protection:

  • Policy enforcement happens on-chain, not in the extension
  • Malicious extension can't mint fake receipts (requires on-chain transaction)
  • Vault validates receipt before authorizing signing
  • Network share won't participate without valid vault authorization

Residual risk: A compromised extension could still request signing of policy-compliant transactions.

Threat: Malware on Device

Scenario: Your device is infected with cryptocurrency-stealing malware.

Attack: Malware intercepts transactions, modifies destinations, or attempts direct key theft.

Protection:

  • Key share is stored encrypted in secure enclave
  • Policy checks happen on-chain, beyond malware's reach
  • Destination validation prevents address replacement attacks
  • Amount limits cap potential losses

Residual risk: Sophisticated malware might wait for you to legitimately unlock your key share and then race to sign malicious transactions.

Threat: Replay Attack

Scenario: Attacker captures a valid signing request and tries to reuse it.

Attack: Replay the request to sign the same transaction again or a similar one.

Protection:

  • Each PolicyReceipt is consumed (deleted) after use
  • IntentRecord in the vault prevents signing the same intent twice
  • Intent hash uniquely identifies each transaction

Residual risk: None for exact replays. Different transactions require new receipts.

Threat: Backend Compromise

Scenario: An attacker gains access to Kairo's backend servers.

Attack: Use server access to sign transactions or mint fake receipts.

Protection:

  • Backend can't sign without your local key share
  • Backend can't mint receipts without the transaction passing policy (on-chain)
  • Vault authorization happens on-chain with full verification
  • All actions are logged in immutable custody trail

Residual risk: A compromised backend could potentially refuse to participate in signing (denial of service) but cannot steal funds.

Threat: Seed Phrase Theft

Scenario: Traditional wallets lose funds when seed phrases are stolen.

Attack: Phishing, social engineering, or data breach exposes seed phrase.

Protection:

  • Kairo doesn't use seed phrases
  • Your key share is useless without the network share
  • No single secret gives complete access

Residual risk: If you export your private key for backup purposes and that backup is stolen, you're in the same situation as seed phrase theft (though policy still helps).

Threat: Clipboard Hijacking

Scenario: Malware monitors your clipboard and replaces copied addresses.

Attack: You copy a friend's address, malware replaces it with attacker's address.

Protection:

  • Destination allowlist prevents sending to unexpected addresses
  • Policy shows and verifies the actual destination
  • Named addresses make mismatches obvious in approval UI

Residual risk: If you've whitelisted many addresses, you might approve a swapped address that happens to be on your list.

Threat: SIM Swap / 2FA Bypass

Scenario: Attacker takes over your phone number and bypasses SMS-based 2FA.

Attack: Access your exchange accounts, reset passwords, drain funds.

Protection:

  • Kairo uses passkeys, not SMS-based authentication
  • Passkeys are hardware-bound, not tied to phone numbers
  • Network share requires cryptographic proof, not SMS codes

Residual risk: None from SIM swap specifically. Device compromise is a separate threat.

Threats Kairo Cannot Fully Mitigate

Threat: Complete Device Compromise

Scenario: Attacker has full access to your device AND your biometrics/PIN.

Impact: They can sign any transaction your policy allows.

Why it's limited:

  • Policy limits the damage (spending caps, allowlists)
  • Custody trail shows exactly what happened
  • But within policy bounds, they can act

Mitigation:

  • Strong biometrics over device PIN
  • Short auto-lock timeouts
  • Consider hardware key for passkey
  • Restrictive policy limits exposure

Threat: Policy Misconfiguration

Scenario: You configure a policy that allows more than intended.

Impact: Transactions you didn't intend might be approved.

Why it's limited:

  • Kairo enforces your policy exactly
  • If your policy is permissive, so is Kairo

Mitigation:

  • Start with restrictive defaults
  • Add addresses individually as needed
  • Review and test your policy
  • Don't use "allow all" configurations

Threat: User Approval of Malicious Transaction

Scenario: You review a transaction and approve it, but it's actually malicious.

Impact: Transaction goes through because you approved it.

Why it's limited:

  • Kairo can't read your mind
  • If you approve a transaction to an allowed address, it signs

Mitigation:

  • Carefully review transaction details
  • Use descriptive names for allowed addresses
  • Don't rush through approval screens
  • Set amount limits as a safety net

Threat: Smart Contract Vulnerabilities

Scenario: You interact with a DeFi protocol that has a bug.

Impact: Protocol bug drains your approved deposit.

Why it's limited:

  • Kairo protects signing, not contract execution
  • Once signed, the transaction executes as written
  • Protocol vulnerabilities are outside Kairo's scope

Mitigation:

  • Only use audited protocols
  • Start with small amounts
  • Monitor protocol security news
  • Consider smart contract insurance

Threat: Network-Level Attacks

Scenario: Sui blockchain or Ika network is compromised at a fundamental level.

Impact: Could potentially affect policy enforcement or signing.

Why it's limited:

  • These are foundational security assumptions
  • Kairo's security depends on Sui's BFT and Ika's threshold cryptography

Mitigation:

  • These networks have significant security resources
  • Vulnerabilities would likely be patched quickly
  • Defense in depth (policy + keys) provides layers

Threat: Zero-Day Exploits

Scenario: Unknown vulnerability in browser, OS, or cryptographic libraries.

Impact: Could bypass security measures.

Why it's limited:

  • Can't defend against unknown attacks
  • This applies to all software

Mitigation:

  • Keep systems updated
  • Multiple security layers mean one compromise doesn't mean total loss
  • Kairo monitors for security issues

Trust Assumptions

For Kairo's security model to hold, we assume:

| Component | Assumption | |-----------|------------| | Your device | Not persistently compromised with root access | | Your passkey | Protected by secure hardware and biometrics | | Sui network | Byzantine fault tolerant, consensus works | | Ika network | Threshold cryptography is secure | | Cryptography | Standard algorithms (keccak256, secp256k1) are secure | | You | Review transactions before approving |

Risk Summary

| Threat | Kairo Protection | Residual Risk | |--------|------------------|---------------| | Device theft | Key encrypted with passkey | If biometrics compromised | | Phishing | Policy blocks unknown addresses | If address is allowlisted | | Malware | On-chain enforcement | Sophisticated attacks | | Extension compromise | On-chain policy | Within policy bounds | | Backend compromise | Can't sign without user share | Denial of service | | Replay attacks | Receipt consumption | None | | Clipboard hijacking | Allowlist validation | If swapped address allowed | | Full device + bio compromise | Policy limits | Within policy limits | | Policy misconfiguration | Enforces as configured | User error | | Smart contract bugs | N/A (out of scope) | Full | | Network attacks | Depends on Sui/Ika | Foundational risk |

Recommendations by Risk Tolerance

High Value / Low Risk Tolerance

  • Strict allowlist with minimal addresses
  • Low spending limits
  • Taproot-only for Bitcoin
  • Short policy expiration (renew periodically)
  • Multiple devices with independent passkeys
  • Regular audit trail review
  • Hardware security key for passkey

Medium Value / Normal Use

  • Allowlist with common DeFi protocols
  • Reasonable spending limits
  • Cloud-synced passkey for convenience
  • Periodic policy review
  • Automated verification

Lower Value / Higher Convenience

  • Broader allowlists
  • Higher or no spending limits
  • Standard passkey setup
  • Less frequent review

Staying Secure

  1. Start restrictive — You can always add permissions
  2. Review before approving — Don't rush signing
  3. Keep software updated — OS, browser, and extension
  4. Monitor your trail — Check custody events periodically
  5. Have recovery ready — Don't wait until you need it
  6. Report suspicious activity — To Kairo and relevant authorities

Next Steps

© 2026 Kairo Guard. All rights reserved.