Security by Turnkey

Enterprise-grade security for onchain assets

Ensure predictable, auditable, and resilient operations with verifiable security that puts your team in control.

Trusted Execution Environments (TEEs)

Manage your keys

Turnkey uses AWS Nitro Enclaves, a trusted execution environment that keeps every cryptographic operation isolated.

Hardened Key Security

Generate raw private keys and keep them safe with hardware isolated, institutional-grade security.

Trusted Transactions

Sign transactions with private keys exclusively within this trusted environment.

Flexible Custody

Custody keys in multiple ways — non-custodial, custodial, or hybrid — with flexible enclave architecture.

an illustration of a safe
An illustration of puzzle pieces falling into place
End-to-End Reproducibility

Reproduce your code

Full-source reproducibility ensures developers can verify the entire enclave software stack.

Auditable Code

Trace every line of code, dependency, and build step that produced the binary.

Reproducible Builds

Allow anyone to reproduce the same hash with deterministic builds.

Impenetrable Architecture

Prevent hidden changes, stealth dependencies or malicious insertions.

Remote Attestation

Verify your runtime

Remote attestation proves that the code running in a Turnkey enclave matches what you’ve verified.

Attested Binaries

Independent attestations for each enclave fingerprint the exact binary

Proven Runtime

Check that hash against our deterministically built source code.

Ensured Security

Ensure that every key operation is executed inside the intended trusted environment.

A diagram representing remote attestation
Will

Product Lead at Alchemy

"Turnkey's novel approach to security ensures end users remain in control of their private keys, while allowing us to create a dramatically better developer experience."
Chris Fernandes

Co-founder and CTO at Mural Pay

“Turnkey strikes that rare balance between uncompromising security and an intuitive user experience. They've been an invaluable infrastructure partner since day one.”
Josh Ben-David

CEO at Pass App

“With Turnkey, we saved at least six months of engineering time, integrated in just a few weeks, and have had perfect uptime since launch. That kind of reliability and speed is rare — especially at this level of security.”

Policy your transaction

The policy engine enforces enclave-secured rules on every transaction and enables delegated access with built-in controls.

Policy engine

Enforce fine-grained rules directly inside hardware-isolated secure enclaves.

Protected Policy
Ensure rules will not be bypassed with our in-enclave security model

Modifiable Limits
Define limits by address, asset, size or approval flow

Ensured Enforcement
Prove all actions will follow your defined policies with verifiable, cryptographic proof

Delegated access

Safely enable scoped access to teammates, services, and AI-agents.

Controlled Sessions
Enforce sessions with strict expirations and scoped to your defined policy

Permissioned Access
Grant collaborators and agents controlled session access without exposing keys

Empowered Workflows
Power automation, integrations, and AI-driven workflows securely

Security from first principles.

Performant

Turnkey’s infrastructure adapts seamlessly as demand grows, ensuring <100ms signing latency to give applications the highest security without the cost.

Verifiable

With every critical operation verified, the code inside the enclave remains trustworthy. This ability to audit with complete transparency ensures a trust you can prove.

Secure

Secure enclaves protect keys and handle all signing and policy enforcement. Plus, consistent independent audits keep Turnkey accountable.

Get started with Turnkey today

Contact Sales