
We’re excited to announce the first in a series of launches designed to make critical crypto workflows provably secure. Turnkey is now providing visible proof that wallet creation happened securely inside isolated enclaves — fully auditable, verifiable, and visible to your users.
In today’s decentralized applications, developers need confidence that critical workflows are running exactly as intended. One small error, hidden logic, or misconfigured process can have massive consequences. This is the first step in a broader journey to make that confidence provable, giving developers the tools to see and verify exactly what happens at every step.
The principles behind verifiability
Turnkey’s architecture is built on three key pillars:
1. Trusted Execution with TEEs
Trusted Execution Environments (TEEs) provide a hardware-isolated space to execute sensitive workflows. By running critical operations inside TEEs, Turnkey ensures that code executes securely, without interference from external processes or potential attackers.
2. End-to-end reproducibility
Full-sourced bootstrap reproducibility ensures that the code running inside the enclave can be rebuilt bit-for-bit. This means that developers and auditors can verify the exact build that is deployed in production, from kernel to dependencies.
3. Verifiability
Verifiability provides cryptographic proof that workflows ran exactly as expected. Combined with reproducibility and TEEs, it guarantees that what was reviewed is exactly what was executed, leaving no room for hidden logic or surprises.
How this translates into developer benefits
Turnkey is turning secure enclave execution, reproducibility, and verifiability into tangible advantages you can use right away:
1. Confident wallet creation
Every wallet created with Turnkey is proven to follow the intended workflow. By running wallet creation inside isolated enclaves, Turnkey prevents hidden logic or unexpected behavior, giving developers and users confidence that wallets are created safely and correctly.
2. Fully verifiable builds
Developers can leverage Turnkey’s reproducible build process to verify Turnkey’s wallet creation proof. This means the code running in production can always be traced back to the exact version reviewed and tested, ensuring consistency and trustworthiness across deployments.
3. Transparent user proof
End users can see proof directly through pre-built UI components, like the Embedded Wallet Kit. This transparency not only strengthens user trust but also makes it clear that every operation is verifiable and secure.
4. Cryptographic audit trails
Each workflow generates cryptographic evidence that can be used for compliance, debugging, or incident response.These proofs are secure and tamper-resistant, keeping sensitive information private.
A roadmap for future verifiability
This is just the beginning. Our verifiability roadmap lays out the next steps in making all critical workflows provable and auditable:
- Verifiable Parsing and Policies: Expand verifiable proof to transaction parsing and policies.
- End-to-end Third-Party Verifiability: Independent parties will be able to verify critical operations from kernel to dependencies.
- Turnkey Verifiable Cloud: Extending provable security beyond wallet creation to sensitive computations themselves.
- Major Customer Launches: Early adopters are preparing to deploy verifiable cloud in production.
Each of these milestones builds on the foundation we’re setting today — giving developers and users confidence that all critical workflows can be fully audited and verified.
Building confidence today, expanding tomorrow
With this launch, developers gain confidence in wallet creation today, and set the stage for proving other sensitive workflows tomorrow. By combining secure enclave execution, reproducible builds, and cryptographic verifiability, Turnkey is setting a new standard for provable, auditable operations in crypto infrastructure.
This is the first of many launches in our journey to make provable workflows a standard for crypto developers and their users. Developers can opt in today and start integrating user proof into their workflows, ensuring that wallet creation is not just invisibly secure, it’s provably secure.