Documentation Index
Fetch the complete documentation index at: https://docs.prudra.dev/llms.txt
Use this file to discover all available pages before exploring further.
How managed wallets work
Managed wallets use envelope encryption to protect private keys. This is different from having Prudra sign transactions on your behalf using a single shared key — each organisation has its own private key, encrypted with a key encryption key (KEK) that lives in hardware.Envelope encryption model
Envelope encryption uses two layers of keys:| Layer | Key | Location |
|---|---|---|
| KEK (Key Encryption Key) | Symmetric encryption key | KMS hardware — Prudra never stores this |
| DEK (Data Encryption Key) | The wallet private key | Encrypted ciphertext in Postgres |
- Load the ciphertext from Postgres
- Send to KMS: “decrypt this”
- KMS returns the plaintext key in memory
- Sign the transaction
- Discard the plaintext immediately (
plaintextKeyBuffer.fill(0)in afinallyblock)
BIP-44 derivation paths
All wallet addresses are derived from the organisation’s master seed using BIP-44:- Master wallet on Base:
m/44'/60'/0'/0/0 - Child address 1:
m/44'/60'/0'/0/1 - Child address 2:
m/44'/60'/0'/0/2
The keyVersion field
ThekeyVersion field on the Wallet type is an opaque string identifier for the current encryption key version. It’s surfaced in the API for informational purposes. You don’t need to store or use keyVersion in your application — Prudra uses it internally to track which key version encrypted which key material.
Key rotation
KEK rotation happens every 90 days automatically. When the KEK rotates:- A new KEK version is created in KMS
- The re-encryption job decrypts each ciphertext with the old KEK and re-encrypts with the new KEK
- The
keyVersionfield is updated - The old KEK version is retired after all re-encryption is complete
What “zero plaintext persistence” means
The private key:- Is generated in memory at provisioning time
- Is immediately encrypted and stored as ciphertext
- Is never written to disk in plaintext
- Is never logged
- Exists in memory for the duration of a signing operation only
- Is actively zeroed with
Buffer.fill(0)after signing
Funds recovery
KMS keys are exportable to your own Google Cloud account using the key wrapping mechanism. The key export procedure is documented in Prudra’s Terms of Service. In the event of service termination, organisations can export their KEK and decrypt their wallet private keys independently.Related
- Provision a wallet — create a managed wallet
- Derive child addresses — BIP-44 child address generation
- Key rotation — KEK rotation schedule and process
- Key custody and recovery — custody model, audit logs, recovery

