PrimeVault FAQs
Security, Attestation and Upgrades
5 min
how do you make sure only approved code can access keys or run the policy engine? each secure instance proves what code it is running by presenting a measurement hash key wrapping and access policies are tied to that measurement new instances must prove they match the expected code before they can unlock keys or participate in signing this prevents tampered code from getting access and allows safe autoscaling how are software upgrades handled without compromising control? upgrades follow a staged path build, verify, test in a small canary, then roll out builds are reproducible, checksums are published, and attestation checks are enforced customer environments can require co approval and a pin for an approved measurement if something looks wrong, rollbacks are documented and pre tested what prevents ui tampering or label spoofing from causing a bad signature? approvals are based on a verified intent and an enclave compiled payload, not on labels in the ui the engine validates the raw destination, asset, amount, and calldata, then re simulates the call before allowing any signature hash chained audit logs make selective tampering or censorship detectable what software supply chain (slsa) level do you meet? in practice, our supply chain controls are designed to meet the higher end of slsa (level 3+) all code and infrastructure definitions live in github with strict branch protections, mandatory peer review, ci enforced tests, and staged rollouts from staging to production with full change logging and rollback plans for the enclave and policy engine components, we use deterministic, reproducible builds from an open build specification and publish build hashes to a public blockchain so customers can independently verify they are running the expected binary we also apply formal verification techniques for critical components rather than relying only on testing or traditional audits if you need it, we can provide a control by control mapping to the slsa version their security team uses and arrange third party attestation do you support mtls and ip allowlisting for api clients? yes, we use mutual authentication at the application layer, which in practice is stronger than classic certificate based mtls and easier to operate each api user registers a public key with primevault, keeps the private key in their own secure environment or kms, and signs every api request the platform verifies the signature before processing the call, and we can optionally support fully customer encrypted payloads so primevault cannot inspect the contents additionally, you can restrict network access with ip allowlisting under settings → ip whitelist, allowing only requests from your specified server ips to be accepted by our api gateway in combination, signed requests, optional end to end encryption, and ip allowlists provide the same or stronger guarantees than traditional mtls if a regulator or internal policy explicitly requires certificate based mtls, we handle that as an enterprise deployment requirement and work with your security team to design the exact setup they need