
Turnkey has always believed in one simple principle: don’t trust, verify. From day one, our infrastructure has been built to make critical operations verifiable, not just secure. Every key creation, policy evaluation, and signature on Turnkey runs inside secure enclaves, producing proofs which attest to the exact code that is running.
Now, Turnkey is extending verifiability beyond our platform. We’re giving customers and third parties the ability to independently confirm that every operation executed exactly as intended.
This is our Verifiability Roadmap: a concrete path toward complete, end-to-end verification of everything that happens on Turnkey.
The vision: Verifiability as the default
Turnkey believes that any high-trust system should be provable. Our goal is to make verifiability the default for every Turnkey customer. That means every build powering wallet operation, policy evaluation, and enclave workload can be reproduced, audited, and cryptographically verified by anyone, not just by us.
Step 1: Verifiable wallet creation
Our first milestone is live: verifiable wallet creation.
We're starting with the world's first visible proof that secure application binaries run inside legitimate isolated enclaves, and will, in the coming weeks, open-source enclave code to enable end-to-end verification, down to exact lines of code. This cryptographic evidence can be used for compliance, debugging, or incident response, and these proofs are secure and tamper-resistant, keeping sensitive information private.
With verifiable wallet creation, Turnkey’s customers, and their end users, don’t just trust that their wallets were created securely, they can prove it.
Step 2: Verifiable parsing, policy evaluation and more
Policies define who can act, under what conditions, and according to which rules. To make them verifiable, Turnkey is introducing verifiable parsing and policy execution, ensuring the decision process – from inputs to outcomes – can be attested and proven.
In practice, that means:
- Policy parsing and evaluation happen inside secure enclaves.
- Attestations capture the exact logic and configuration executed.
- Cryptographic records show each evaluation step and result.
This extends verifiability from signing to the authorization of signing requests, giving enterprises proof that their rules were followed precisely as written.
Step 3: Cryptographically guaranteed customer operations: “Turnkey Verifiable Cloud”
With Turnkey Verifiable Cloud, we’re extending the same verifiable guarantees that make Turnkey wallets secure to any sensitive computation you run. That means every critical operation is executed inside hardware-isolated secure enclaves, producing cryptographic proofs that can be independently verified.
Specifically, this means customers can:
- Run workloads inside enclaves with full confidence in the underlying security guarantees.
- Provide their users with cryptographic evidence of the exact code and runtime environment powering their sensitive application logic.
- Launch quickly using Turnkey’s proven infrastructure, already securing millions of wallets and daily transactions.
This turns verifiability into an assurance you can bring to your own product and functionality. Your teams and users don’t just trust that your operations are secure, they can cryptographically verify it independently.
Step 4: Open-source enclave apps to complete end-to-end reproducibility
True verifiability requires external validation. Our next milestone enables end-to-end reproducibility, so third parties can independently verify the integrity of Turnkey workloads, from kernel to dependencies.
We will open-source all core enclave applications, letting third parties independently reproduce the deployed application binaries bit-for-bit, and confirm that their local digest matches the proof digest exactly.
This transforms verifiability from an internal guarantee to a public commitment: customers and auditors can verify Turnkey's execution by directly auditing our source code.
Why it matters
As crypto, AI, and finance blend, every critical operation needs to be reproducible and provably secure. Credibly neutral systems cannot rely on trust. They need proofs and independent verification to scale. Turnkey’s roadmap makes this a reality, giving teams the ability to verify, not assume, how their infrastructure behaves.
This isn’t theoretical. We’ve already deployed these capabilities with major enterprise customers, who will be launching on Turnkey Verifiable Cloud later this year. It’s the first demonstration of complete, end-to-end transparency from source code to application binaries, to the hardware running it.
From wallets to workloads
Wallets were our starting point because they demand the highest levels of security and proof. But verifiable execution applies broadly: onchain transactions, AI inference, oracle feeds, trading logic, and more.
Turnkey’s next chapter is about powering the world’s most sensitive workloads, running on infrastructure designed for proof over promise.
Don’t trust, verify. And now, you can do it yourself.