Every part of CubeSigner reflects a deliberate design choice.

CubeSigner is built to contain risk by design—to limit what can go wrong and minimize the blast radius.

Our Technology

CubeSigner System Architecture

Learn more about our comprehensive security approach.

CubeSigner System Architecture image

Principles

CubeSigner Security Properties

CubeSigner is designed to allow the correct people to sign safe messages, without giving them direct access to private keys.

Least Privilege

Complete Mediation

HSM Root of Trust

CubeSigner Technical Design Principles

A few examples, we: Use FIPS 140-certified HSMs as our root of trust—the same hardware that protects the world’s banking infrastructure and the entire internet’s public key infrastructure; we use a simple, mature subset of TPM 2.0 functionality

(instead of the relentlessly broken SGX); we don’t roll our roll our own OS kernel nor rely on experimental libOSes; and we use broadly trusted and formally verified cryptographic libraries.

Among other things, we: Enforce security properties—for example, that a transaction complies with any relevant policies before a key will sign it—with the type system; created a ratcheted

cryptographic protocol that prevents us from seeing secrets and enforces session integrity; and automatically analyze our code and dependencies.

Users can configure their systems so that only the right things can happen. For example, they can: set rules around how a certain group of people can use a certain key (e.g., engineers need approval from finance for high-value transactions);

restrict how funds are spent with custom policy code; require specific 2FA methods (e.g., FIDO) for exceptions; and automatically revoke compromised tokens.

System Components

What we believe shows up in what we've built.

Every part of CubeSigner traces back to a design principle. We’ve spent our careers studying how systems fail—not just in theory, but in the real world, where complexity, pressure, and human error collide. This experience shapes how we think about architecture: where to draw security boundaries, which assumptions to question, and how to make safety the default.

Certificate icon

Audited by Veridise

Veridise is a recognized leader in program analysis, verification, and automated reasoning. Their team conducts thorough and ongoing reviews of CubeSigner’s codebase—including key-handling logic, deployment pipeline, authentication layer, policy engine, and client SDK. Their audits go beyond surface-level checks: Veridise has engaged deeply with the underlying cryptographic protocols and the design decisions behind our implementation.

Veridise Verified icon
Kostas Ferles picture

“Cubist consistently provides high-quality, well-documented code built with a security-first design. Their developers actively collaborated with our auditors and promptly provided fixes. It's a pleasure to review code for Cubist projects.”

Kostas Ferles • Chief Research Officer of Veridise
Arrow icon

Security doesn’t stop at the product.

See how we protect data, credentials, and operations.

Go to Information Security