Skip to content
TwitterGitHub

Security Design

Purro’s security model balances strong guarantees with practical UX.

  • Local-only generation and storage
  • AES‑256‑GCM encryption; PBKDF2-derived keys
  • No plaintext seed or key storage; secure random via browser crypto
  • Auto-lock on inactivity or tab close
  • Manual lock and re-authentication for sensitive actions
  • Per-origin permissions; scoped provider injection
  • Connection warnings and domain verification
  • EIP‑712 typed signing preferred
  • Pre-signing review with human‑readable context
  • Guardrails for gas parameters and malformed transactions
  • Informational only; not legal/financial advice
  • Non-custodial: users control keys; team cannot recover seeds or funds
  • Features and timelines may change; third-party dependencies can affect delivery
  • Users are responsible for secure backups and device hygiene

Developer deep dive on key security and code references: see Extension › Security Model.