Walletbeat score: 22%*

The Cypherock has a secure element (EAL6+ rated) and uses a unique card-tapping system for transaction authorization.

Platforms: as a hardware wallet.


Security

4%*
How secure is Cypherock Wallet?
Does the wallet warn the user about potential scams?
UNRATED

Walletbeat's database does not have the necessary information on Cypherock Wallet to assess this question.

Please help us by contributing your knowledge on our repository!

GitHub Repository

Why does this matter?

Transactions in Ethereum are very difficult to reverse, and there is no shortage of scams. Wallets have a role to play in helping users avoid known scams ahead of the user making the transaction.

How is scam prevention evaluated?

Wallets are rated based on whether they alert the user about potential scams. This is measured along three scenarios: Does the wallet warn the user when...

  • Sending funds to an address the user has never previously sent or received funds from before
  • Interacting with a contract that is known to be a scam
  • Interacting with a contract that the user has never previously interacted with before
  • Interacting with a contract that has only recently been deployed onchain
  • Connecting to an app that is known to be a scam

For payments-focused wallets that do not support interacting with arbitrary contracts or external applications, only the payment scenario applies.

Note that wallets should only warn the user about such scenarios, not outright prevent the user from making such transactions, as preventing them entirely would limit the user's ability to have real sovereignty over their own wallet.

Wallets are also rated based on whether these warnings are implemented in a privacy-preserving manner. Specifically:

  • When sending funds, does the lookup for past interactions with that address unconditionally reveal the sender and recipient addresses to an external provider other than the wallet's default RPC provider for this chain?

    • Wallets can implement this feature in a privacy-preserving manner by maintaining a local set of known addresses.
  • When interacting with a contract, does the check whether that contract is known to be a scam reveal the user's IP address together with the contract address about to be interacted with?

    • This is a privacy leak similar to that of leaking the user's browsing history, as contract addresses are usually closely tied to the application being visited.
    • Wallets can implement this feature in a privacy-preserving manner by maintaining a local, frequently-updated cache of known-scam contract addresses.
  • When connecting to an application, does the check whether that application reveal the domain name or URL of the application being used?

    • If leaking full URLs, this is a privacy leak similar to that of leaking the user's browsing history.
    • If leaking domain names only, they must not be linkable to the user's IP address or Ethereum address.
    • Wallets can implement this feature in a privacy-preserving manner by maintaining a local, frequently-updated cache of known-scam contract URLs, or by looking up such a list based on a domain hash prefix like Safe Browsing.

  • A wallet would get a passing rating if...

    • The wallet implements all required scam warning features in a privacy-preserving manner.
  • A wallet would get a partial rating if...

    • The wallet implements some but not all the required scam warning features.
    • The wallet implements all required scam warning features, but not in a privacy-preserving manner.
  • A wallet would get a failing rating if...

    • The wallet does not implement any form of scam alerting.
    • The wallet leaks visited URLs to an external service as part of its malicious app warning feature.
Does the wallet support secure app signing with hardware wallets?
FAIL
Cypherock Wallet supports hardware wallets but does not implement effective app signing. App signing is important for security as it allows users to verify transaction details on their hardware wallet screen before signing.
  • Independent video demonstration of Cypherock's signing implementation.

  • Independent video demonstration of Cypherock's transaction implementation.

Why should I care?

App Signing is a critical security feature for hardware wallets that allows users to verify transaction details directly on their hardware wallet's screen before signing. This verification step is crucial for preventing attacks where malicious software might attempt to trick users into signing transactions with different parameters than what they intended.

Without app signing, users must trust that the software wallet is displaying the correct transaction details and not manipulating them. With app signing, the hardware wallet shows the actual transaction details that will be signed, providing an independent verification mechanism that significantly enhances security.

Full app signing implementations ensure that all relevant transaction details (recipient address, amount, fees, etc.) are clearly displayed on the hardware wallet screen, EIP-712 message hashes, and decoded calldata, allowing users to make informed decisions before authorizing transactions.

How is a wallet's hardware wallet app signing support evaluated?

Hardware wallets are evaluated based on their implementation of app signing capabilities.

A hardware wallet receives a passing rating if it implements full app signing, where all transaction details are clearly displayed on the hardware wallet screen for verification before signing. This includes support for standard transactions, ERC-20 token transfers, 712 messages and complex contract interactions.

The hardware should be able to display clearly all transaction types on Safe, Aave and Uniswap. To do so the hardware MUST be able to connect directly to the application or allow the user to use at least two different software wallets independent from the hardware manufacturer.

A hardware wallet receives a partial rating if it implements app signing but with limitations, such as not displaying all transaction details or not supporting app signing for all transaction types. Or if the hardware supports only one independent software wallet. Or if the hardware supports only 1/3 of the apps.

A hardware wallet fails this attribute if it doesn't properly implement app signing functionality, requiring users to trust the connected software wallet without independent verification.


A few examples:
  • A wallet would get a passing rating if...

    • The wallet implements full app signing with hardware wallets, displaying all transaction details on the hardware wallet screen for verification before signing.
  • A wallet would get a partial rating if...

    • The wallet implements partial app signing, where most but not all transaction details are displayed on the hardware wallet screen.
    • The wallet implements basic app signing, but the implementation is limited and doesn't provide full transparency for all transaction details.
  • A wallet would get a failing rating if...

    • The wallet supports hardware wallets but does not implement effective app signing.
    • The wallet does not support hardware wallets at all.

What can Cypherock Wallet do to improve hardware wallet app signing support?

Cypherock Wallet should implement comprehensive app signing support for hardware wallets to improve security by allowing users to verify transaction details on their hardware device.
Does Cypherock Wallet implement a bug bounty program and provide security updates?
PARTIAL
⚠️

Cypherock Wallet implements a basic bug bounty program that offers some incentives for security researchers to find and report vulnerabilities. However, the program has limitations in terms of scope, reward size, or responsiveness.

Positively, the wallet provides an upgrade path for users when security issues are identified.

  • Bug bounty program with responsible disclosure policy and discretionary rewards

Why should I care?

Hardware wallets manage sensitive cryptographic keys and access to users' funds, making them high-value targets for attackers. Bug bounty programs incentivize security researchers to responsibly discover and disclose vulnerabilities, rather than exploit them.

A well-structured bug bounty program:

  1. Provides clear guidelines for researchers to report vulnerabilities
  2. Offers appropriate rewards based on severity of findings
  3. Demonstrates a commitment to addressing security issues quickly
  4. Communicates transparently about discovered vulnerabilities and their resolution

Additionally, hardware wallets should provide upgrade paths for users when critical security issues are discovered, as these physical devices can't always be fixed with simple software updates.

How is a hardware wallet's bug bounty program evaluated?

Hardware wallets are assessed based on the comprehensiveness of their bug bounty program:

  1. Pass (Best): Implements a comprehensive bug bounty program with:

    • Clear scope and guidelines
    • Competitive rewards based on severity
    • Responsive disclosure process
    • Transparent communication about fixes
    • Offers upgrade paths for users when needed
  2. Partial: Implements a basic bug bounty program with limitations:

    • Basic vulnerability disclosure policy but no formal rewards
    • Limited scope or small rewards
    • Slower response times
    • Unclear upgrade paths for users
  3. Fail: No bug bounty program or security update process:

    • No formal process for reporting vulnerabilities
    • No incentives for responsible disclosure
    • No clear path for providing security updates
    • Known critical vulnerabilities remain unaddressed

A few examples:
  • A wallet would get a passing rating if...

    • The hardware wallet implements a comprehensive bug bounty program with clear incentives and responsive processes. It offers competitive rewards based on severity, has a transparent disclosure process, and provides upgrade paths for users.
  • A wallet would get a partial rating if...

    • The hardware wallet implements a basic bug bounty program with limited scope or rewards. However, it does provide a clear upgrade path for users when security issues are discovered.
    • The hardware wallet implements a vulnerability disclosure policy but does not offer formal rewards. It also lacks a clear upgrade path for users when security issues are discovered.
  • A wallet would get a failing rating if...

    • The hardware wallet does not implement any bug bounty program or vulnerability disclosure policy. It also lacks a clear process for providing security updates to address critical issues.

What can Cypherock Wallet do to improve its bug bounty program?

Cypherock Wallet should:

  • Expand the scope and increase rewards for their bug bounty program

  • Improve response times and transparency in the vulnerability handling process

Does Cypherock Wallet have a secure and transparent factory supply chain?
UNRATED

Walletbeat's database does not have the necessary information on Cypherock Wallet to assess this question.

Please help us by contributing your knowledge on our repository!

GitHub Repository

Why does this matter?

Ensuring the security and transparency of the factory supply chain is vital to prevent tampering or compromise during manufacturing, packaging, and delivery. Users need confidence that the device they receive is genuine and hasn't been maliciously altered.

How is a factory wallet's supply chain evaluated?

Evaluated based on:

  • Factory Operational Security: Availability and verification (audits, certifications) of documentation detailing security practices during manufacturing.

  • Tamper Evidence: Effectiveness of physical seals or mechanisms to detect package tampering.

  • Hardware Verification: Ease of verifying the received hardware against a Bill of Materials (BOM) or reference design.

  • Tamper Resistance: Physical device protections (e.g., security mesh) against unauthorized modification.

  • Genuine Check: Availability and reliability of software/hardware mechanisms to verify device authenticity before and during use.

  • Anti-Kleptography: Measures to prevent cryptographic keys or randomness from being subtly leaked during operations.


A few examples:
  • A wallet would get a passing rating if...

    • The hardware wallet passes all factory supply chain sub-criteria.
  • A wallet would get a partial rating if...

    • The hardware wallet passes some factory supply chain sub-criteria.
  • A wallet would get a failing rating if...

    • The hardware wallet fails most or all factory supply chain sub-criteria.
Does Cypherock Wallet have secure and open firmware?
UNRATED

Walletbeat's database does not have the necessary information on Cypherock Wallet to assess this question.

Please help us by contributing your knowledge on our repository!

GitHub Repository

Why does this matter?

Firmware security and openness are critical for user trust, resistance against attacks, and ensuring the device can be safely upgraded. Users need assurance that the code running on their device is authentic and hasn't been tampered with. Openness allows for independent verification and community audit.

How is a wallet's firmware evaluated?

Evaluated based on several factors:

  • Update Security: Protection against silent/forced updates, authentication requirements for updates, and possibility of downgrades.
  • Source Code Openness: Availability and licensing of firmware source code (full or partial), and isolation between open/closed parts.
  • Build Verifiability: Ability to reproduce firmware builds from source and compare against official binaries (reproducible builds).
  • Runtime Integrity: Mechanisms to check the authenticity of the code running on the device.
  • Custom Firmware: Support for users loading custom firmware and its impact on device security/integrity.

A few examples:
  • A wallet would get a passing rating if...

    • The hardware wallet passes most firmware sub-criteria.
  • A wallet would get a partial rating if...

    • The hardware wallet passes some firmware sub-criteria.
  • A wallet would get a failing rating if...

    • The hardware wallet fails most or all firmware sub-criteria.
Does Cypherock Wallet securely generate, protect, and handle keys?
UNRATED

Walletbeat's database does not have the necessary information on Cypherock Wallet to assess this question.

Please help us by contributing your knowledge on our repository!

GitHub Repository

Why does this matter?

Secure key handling is fundamental to the security of user funds. This includes how the master secret (seed) is generated, stored, and used. The device must protect keys from extraction via software or physical attacks (both passive side-channels and active fault injection). It should also ensure that the manufacturer cannot access or recover user keys.

How is a wallet's key handling evaluated?

Evaluated based on:

  • Master Secret Generation: Use of interoperable, well-documented standards for seed generation.
  • Key Secrecy: Resistance against key extraction or recovery by the external providers. Ensuring keys are not transmitted insecurely.
  • Proprietary Mechanisms: Security implications of any non-standard key handling or backup procedures.
  • Physical Attack Resistance: Protection against passive (side-channel analysis) and active (glitching) physical attacks.

A few examples:
  • A wallet would get a passing rating if...

    • The hardware wallet passes most keys handling sub-criteria.
  • A wallet would get a partial rating if...

    • The hardware wallet passes some keys handling sub-criteria.
  • A wallet would get a failing rating if...

    • The hardware wallet fails most or all keys handling sub-criteria.
Does Cypherock Wallet provide comprehensive user safety features?
UNRATED

Walletbeat's database does not have the necessary information on Cypherock Wallet to assess this question.

Please help us by contributing your knowledge on our repository!

GitHub Repository

Why does this matter?

User safety features are crucial for ensuring users clearly understand the transactions and messages they are signing on their hardware device. This involves presenting information legibly (human-readable addresses/contracts/parameters), providing tools to verify raw data, offering risk analysis and transaction simulation, and preventing unintended actions.

How is a wallet's user safety evaluated?

Evaluated based on the following criteria (mapped to 16 internal sub-criteria):

  • Human readable addresses: Are raw addresses easy to review? Is the HWW displaying the ENS linked to an address if available?

  • Human readable identification of well known contracts: Is the HWW displaying information about well known contracts? How reliable is it (considering rogue proxies)? How independently chosen is it?

  • Possible to review all TX parameters raw: Are all raw parameters from a TX displayed? Easy to review (calldata…)?

  • Human readable review of TX parameters: Is the HWW displaying a human readable version of some/all parameters? Are there restrictions?

  • Coverage of human readable TX parameters reviewable: Describe how extensive/limited the display of human readable TX parameters is. Is it using independent data? How frequently is it collected and updated?

  • Easy to extend human readable TX parameters: Is it possible for the user to add support to get a human readable display of an unknown TX parameter? Describe the process.

  • Expert mode for TX review: Is there a mode available to sign the transaction quickly while displaying enough information to verify the TX on a secondary trusted computer?

  • Possible to review all EIP 712 parameters raw: Are all raw parameters from an EIP 712 message displayed? Easy to review (structures, byte arrays,…)?

  • Human readable review of EIP 712 parameters: Is the HWW displaying a human readable version of some/all parameters? Are there restrictions?

  • Coverage of human readable EIP 712 parameters reviewable: Describe how extensive/limited the display of human readable EIP 712 message parameters is. Is it using independent data? How frequently is it collected and updated?

  • Easy to extend human readable EIP 712 parameters: Is it possible for the user to add support to get a human readable display of an unknown parameter in an EIP 712 message? Describe the process.

  • Expert mode for EIP 712 review: Is there a mode available to sign an EIP 712 message quickly while displaying enough information to verify the EIP 712 message on a secondary trusted computer?

  • Risk analysis support: Is the HWW displaying a risk evaluation / threat warning to the user when signing transactions or messages? Describe how the evaluation works.

  • Risk analysis without phoning home possible: Is it possible to run the risk analysis process without contacting the HWW manufacturer? Describe which external services are involved and if the full TX/message data could be recovered by any party.

  • Fully local risk analysis possible: Is it possible to run the risk analysis evaluation locally? Describe the components provided by the HWW provider and the setup.

  • TX simulation support: Is the HWW displaying high level simulation results (balance difference…) to the user when signing transactions or messages? Describe how the evaluation works.

  • TX simulation without phoning home possible: Is it possible to run the simulation process without contacting the HWW manufacturer? Describe which external services are involved and if the full TX/message data could be recovered by any party.

  • Fully local TX simulation possible: Is it possible to run the simulation locally? Describe the components provided by the HWW provider and the setup.

Rating thresholds: PASS if >=11/16 criteria pass, PARTIAL if >=6/16 pass, else FAIL.


A few examples:
  • A wallet would get a passing rating if...

    • The hardware wallet passes 11 or more user safety sub-criteria.
  • A wallet would get a partial rating if...

    • The hardware wallet passes 6 to 10 user safety sub-criteria.
  • A wallet would get a failing rating if...

    • The hardware wallet passes 5 or fewer user safety sub-criteria.

Privacy

UNRATED
How well does Cypherock Wallet protect your privacy?
Is your wallet address linkable to other information about yourself?
UNRATED

Walletbeat's database does not have the necessary information on Cypherock Wallet to assess this question.

Please help us by contributing your knowledge on our repository!

GitHub Repository

Why does this matter?

Your wallet address is unique and permanent, which makes it easy for applications and companies like Chainalysis to track your activity. In web-privacy terms, it is worse than cookies: wallet addresses are permanent, publicly visible, and can even be tracked across multiple devices and websites. The more personal information is linkable to your wallet address, the more effective such tracking can be. It is therefore important to use a wallet that protects your information from being linked to your wallet address.

How is wallet address privacy evaluated?

In order to qualify for a perfect rating on wallet address privacy, a wallet must not, by default, allow any external entity to link your wallet address to any personal information.

As Walletbeat only considers the wallet's default behavior, wallets may still choose to offer features that allow external providers to link wallet addresses with personal information, so long as this is done with explicit user opt-in.

To determine this, Walletbeat looks at the network requests made by wallets in their default configuration, and the contents of such requests. If a request contains the user's wallet address, we look at whether it also contains any other personal information, such as the user's name, pseudonym, email address, phone number, CEX account information, etc.

Additionally, if such a request is not proxied, then it inherently reveals the user's IP address and ties it with the user's wallet address, which is also personal information.


  • A wallet would get a passing rating if...

    • The wallet does not require any user information to function by default, and proxies all network requests carrying the user's wallet address.
    • The wallet relies exclusively on a user's self-hosted node, involving no external providers.
  • A wallet would get a partial rating if...

    • The wallet allows an external provider to learn the relationship between a user's wallet address and their IP address by default. This is treated as a partial rating because users may mitigate against this by forcing wallet requests to be proxied on their own.
    • The wallet requires the user to identify themselves via a pseudonym which is sent to an external provider or recorded onchain. This is treated as a partial rating because users may choose an arbitrary pseudonym for each of their wallet address to mitigate this privacy issue.
  • A wallet would get a failing rating if...

    • The wallet requires user information (other than IP address and pseudonyms) by default, and uploads this data to an external provider or records it onchain in a publicly-viewable manner.
Can your multiple wallet addresses be correlated with one another?
UNRATED

Walletbeat's database does not have the necessary information on Cypherock Wallet to assess this question.

Please help us by contributing your knowledge on our repository!

GitHub Repository

Why does this matter?

You probably have more than one wallet address configured in your wallet, which you use for different purposes and perhaps as different identities. These wallet addresses all belong to you, but you would rather keep that fact private. It is therefore important to use a wallet that does not reveal that fact.

How is multi-address privacy evaluated?

Wallets are assessed based on whether an external provider can learn that two or more of the user's wallet addresses belong to the same user.

An external provider may learn of this correlation either through:

  • The wallet software explicitly sending this data (e.g. through analytics)
  • Requesting data about multiple wallet addresses in bulk, allowing the receiving endpoint to learn that all of these addresses belong to the same user. Similar correlations are also possible by IP and/or time-based correlation of requests that each contain one wallet address.

In order to prevent this information from being revealed, wallets can use a variety of strategies:

  • Wallets may offer the user to only have one active wallet address at a time, and only ever makes requests about the active wallet address. The user is expected to not change their active address often. The wallet should also ensure that any account-switching widget does not cause bulk/simultaneous requests about multiple addresses to the same endpoint, such as for refreshing balances. Note that this scheme, while simple to implement, is incompatible with stealth addresses. This is because stealth addresses inherently require the user to simultaneously manage a range of addresses.
  • Wallets may look up information about multiple addresses by splitting up the requests such that each request only contains one address, then sending these requests over different proxy circuits in a manner that staggers the requests over time. This ensures that the receiving endpoint cannot correlate addressed based on timing or IP address.
  • Wallets may distribute requests across multiple RPC endpoints owned by separate entities for each wallet address, preventing each entity from learning more than one wallet address.

  • A wallet would get a passing rating if...

    • The wallet makes multiple requests about each of the user's wallet balances, staggering them over time to avoid time-based correlation, and using unique proxy circuits for each wallet address to avoid IP-address-based correlation.
    • The wallet distributes requests about each of the user's wallet balances across unique RPC endpoints owned by different entities, preventing any single entity from learning about more than one wallet address.
    • The wallet only has one active wallet address at a time, and only ever makes requests about this wallet address and no other.
    • The wallet runs by default with a user's own self-hosted node, preventing any external provider from learning about any of the user's wallet addresses.
  • A wallet would get a partial rating if...

    • The wallet makes multiple simultaneous requests about each of the user's wallet balances, proxying each of them through a different proxy circuit (e.g. Tor with unique circuits for each wallet address). The receiving endpoint may still correlate these addresses through time-based correlation.
    • The wallet makes multiple requests about each of the user's wallet balances, staggering them over time to avoid time-based correlation. The receiving endpoint may still correlate these addresses through IP-address-based correlation.
  • A wallet would get a failing rating if...

    • The wallet refreshes multiple address balances by grouping all of these addresses in the same request.
    • The wallet only refreshes the currently-active wallet address balances, but such requests carry an identifier or cookie which can identify the same user across requests for different wallet addresses.
    • The wallet makes multiple simultaneous requests about each of the user's wallet balances, without proxying or staggering the requests.
Can you send and receive tokens without revealing your transaction history to others?
UNRATED

Walletbeat's database does not have the necessary information on Cypherock Wallet to assess this question.

Please help us by contributing your knowledge on our repository!

GitHub Repository

Why does this matter?

Data posted on public blockchains like Ethereum is publicly available to everyone. This means that anyone can see your transaction history. You would not voluntarily post your bank statements or private purchase history online, yet this is what happens by default when transacting on public blockchains.

Many privacy solutions have emerged to solve this problem. However, to be actually usable by users, these solutions must be tightly integrated in wallets and easy to use. Walletbeat looks at whether wallets let users send, receive, and spend tokens privately by default.

How is token transfer privacy evaluated?

In order to get a passing rating, wallets must ensure that sending Ether or ERC-20 tokens to other addresses comes with privacy guarantees by default. In addition, they must ensure that users can receive and spend such tokens privately.

"Privately" here means that other than the wallet user, no single entity (including any external provider) can infer or reconstruct the user's transaction history.

Walletbeat currently recognizes the following privacy-preserving token transfer solutions:


  • A wallet would get a passing rating if...

    • The wallet's token transfers are implemented using ERC-5564: Stealth Addresses Stealth Addresses by default. Each stealth address is refreshed in such a way that no external provider may learn about the correlation between these stealth addresses. When spending private balances, users control which stealth addresses are used. When sending tokens to another user's stealth address, no external provider may learn of the correlation between the sender and the recipient, or of the correlation between the recipient's meta-address and their newly-generated stealth address.
  • A wallet would get a partial rating if...

    • The wallet's token transfers are implemented using ERC-5564: Stealth Addresses Stealth Addresses by default. However, an external provider may learn of the correlation between the user's stealth addresses.
    • The wallet's token transfers are implemented using ERC-5564: Stealth Addresses Stealth Addresses by default. However, when sending tokens, an external provider may learn of the correlation between the recipient's meta-address and their newly-generated stealth address, thereby de-anonymizing the recipient.
    • The wallet's token transfers are implemented using ERC-5564: Stealth Addresses Stealth Addresses by default. However, when sending tokens, an external provider may learn of the correlation between the sender's meta-address or IP, and the recipient's newly-generated stealth address, thereby de-anonymizing the sender and recipient of the transfer.
  • A wallet would get a failing rating if...

    • The wallet does not support private token transfers.
    • The wallet's default option when sending tokens is to perform a public token transfer.
    • The wallet implements ERC-5564: Stealth Addresses Stealth Addresses and uses it by default for transfers. However, it does not let the user control which stealth addresses' balance is used when spending private balances, thereby potentially exposing unintended public onchain links between their stealth addresses.
Does Cypherock Wallet protect user privacy at the hardware level?
UNRATED

Walletbeat's database does not have the necessary information on Cypherock Wallet to assess this question.

Please help us by contributing your knowledge on our repository!

GitHub Repository

Why does this matter?

Hardware privacy ensures that the device itself does not leak sensitive user information (like IP address, public keys, or usage patterns) during setup, regular operation, or updates. This is distinct from the privacy features of the transactions created using the wallet.

How is a wallet's hardware privacy evaluated?

Evaluated based on:

  • Phoning Home: Whether the device contacts manufacturer servers during setup, operation, or updates, and if these connections are necessary.

  • Inspectability: Ability to monitor and understand data exchanged if the device does phone home.

  • Wireless Privacy: Protection of data transmitted over wireless connections (e.g., BLE, WiFi) against local attackers.


A few examples:
  • A wallet would get a passing rating if...

    • The hardware wallet passes all hardware privacy sub-criteria: No phoning home, inspectable remote calls, and encrypted wireless communication.
  • A wallet would get a partial rating if...

    • The hardware wallet passes some hardware privacy sub-criteria.
  • A wallet would get a failing rating if...

    • The hardware wallet fails all hardware privacy sub-criteria: Device leaks privacy in all aspects.

Self-sovereignty

UNRATED
How much control and ownership over your account does Cypherock Wallet give you?
Can the wallet be used with your own self-hosted Ethereum node?
UNRATED

Walletbeat's database does not have the necessary information on Cypherock Wallet to assess this question.

Please help us by contributing your knowledge on our repository!

GitHub Repository

Why does this matter?

Ethereum's design goes to painstaking lengths to ensure that users can run an Ethereum L1 node on commodity consumer-grade hardware and residential Internet connections. Running your own node gives you several important benefits:

  • Privacy: Because the wallet can work directly on your own hardware with no outside dependencies, the wallet can query chain data without revealing private details (wallet address, IP address, etc.) to an external RPC provider.
  • Integrity: Relying on an external RPC provider means that this provider may return incorrect data about the state of the chain, tricking you into signing a transaction that ends up having a different effect than intended. Your own L1 node will verify the integrity of the chain, so such attacks cannot occur when using a self-hosted node.
  • Censorship resistance: Because an L1 node may broadcast transactions into a shared mempool directly to other nodes in the network, your transactions are not censorable by an external RPC provider that would otherwise act as an intermediary.
  • No downtime: Because the L1 node is running on your own hardware, you are not at risk of losing funds or opportunities due to downtime from an external RPC provider.

How is support for self-hosted nodes evaluated?

Wallets are rated based on whether they allow the user to configure the RPC endpoint used for Ethereum mainnet, and whether such configuration is possible before any request is made to an external RPC provider by default.


A few examples:
  • A wallet would get a passing rating if...

    • The wallet lets you configure the RPC endpoint used for Ethereum mainnet.
  • A wallet would get a partial rating if...

    • The wallet does not let you configure the RPC endpoint used for Ethereum mainnet, but lets you add a custom chain with your own self-hosted node as RPC endpoint.
    • The wallet lets you configure the RPC endpoint used for Ethereum mainnet, but makes requests to an external RPC provider before the user has a chance to modify this RPC endpoint configuration.
  • A wallet would get a failing rating if...

    • The wallet uses an external Ethereum node provider and does not let you change this setting.
Are you locked into this wallet? Or can you permissionlessly import your Ethereum account into another wallet?
UNRATED

Walletbeat's database does not have the necessary information on Cypherock Wallet to assess this question.

Please help us by contributing your knowledge on our repository!

GitHub Repository

Why does this matter?

Question: What if a wallet's dev team walked away or turned evil one day?

One of Ethereum's core promises as an Internet upgrade is to avoid the possibility for user lock-in of web2. This is achieved by ensuring accounts are permissionlessly portable across wallets.

Ensuring that accounts remain portable avoids wallets becoming lock-in vectors in web3. Permissionless account portability also keeps the wallet ecosystem healthy through open competition.

How is account portability evaluated?

Wallets are rated based on whether accounts created within can be exported out of the wallet and imported into another, without requiring permission from the exporter wallet provider.

For EOA wallets based on private keys, this is relatively straightforward to determine. However, for more complex situations such as multisig wallets, Walletbeat considers whether such wallets can be made fully self-custodial, and whether assets and tokens can be permissionlessly transferred out of the wallet.

Specifically:

  • EOA wallets are rated based on the exportability of their private key material, and on whether such private key material is derived using the following standards:

    • BIP-39 for deriving a binary seed from a seed phrase.
    • BIP-32 for deterministic hierarchical key derivation from the binary seed.
    • BIP-44 as a standard when deriving hierarchical private keys.
  • MPC wallets are rated based on whether the user has a sufficient shares of the underlying key to have full control over the wallet in a self-custodial manner. Additionally, there must be a way for the user to generate a transaction (Walletbeat uses a token transfer out of the wallet as the litmus transaction for this) without reliance on an external API or proprietary application. The combination of these factors ensures that the wallet remains self-custodial and that the account cannot be frozen in-place due to an uncooperative external provider.

  • ERC-4337: Account Abstraction for smart contract wallets (smart contract wallets) are rated based on the level of control the user has over their account according to the smart contract's control logic that the wallet uses. The user must be in control of who controls their account by default, and be able to permissionlessly create asset transfer transactions.
    Specifically, the rating considers:

    • Whether the user has the ability to change the cryptographic keys used to control the account in general, in a manner that does not involve relying on an external provider or proprietary software.
    • Whether the smart contract wallet's default configuration starts out with the user having self-custody of their account, for example by having a majority of the key shares in self-custody in a multisig wallet.
    • Whether the generation of a token transfer transaction requires relying on an external provider or proprietary software, even if the user has self-custody of all requisite cryptographic keys to sign such a transaction.
  • EIP-7702: Account Abstraction via smart contract authority delegation are not yet rated on account portability and will show up as "Unrated".

If a wallet supports multiple types of accounts, the rating for the account type it supports that is least portable takes precedence. This makes the final rating act as an effective "floor" across the account types the wallet supports.

If a wallet supports multiple types of accounts and all of them have the same level of portability, the account type that takes precedence is the one that the wallet offers the user to create by default.


  • A wallet would get a passing rating if...

    • The wallet is an EOA wallet that derives keys from a seed phrase using BIP-39, BIP-32 and BIP-44, and allows the user to export the seed phrase and/or private keys.
    • The wallet is an MPC wallet where the user is in self-custody of sufficient key shares to unilaterally control the account. The user can generate a token transfer transaction using standalone open-source software which does not rely on any external provider.
    • The wallet is an ERC-4337: Account Abstraction for smart contract wallets (smart contract) wallet, with the user having full self-custodial control by default. The user can create token transfer transactions using solely open-source software without relying on an external provider.
  • A wallet would get a partial rating if...

    • The wallet is an EOA wallet that does not use common seed phrase derivation standards for EOA key derivation, but does allow the user to export private keys so that they can be imported into other wallets.
    • The wallet is an MPC wallet. By default, the user is in self-custody of sufficient key shares to unilaterally control the account. However, the user cannot generate a token transfer transaction without the use of proprietary software.
    • The wallet is an ERC-4337: Account Abstraction for smart contract wallets (smart contract) wallet. The user does not have full self-custodial control by default, but can create a transaction that modifies this using standalone open-source software.
  • A wallet would get a failing rating if...

    • The wallet is an EOA wallet that does not use common seed phrase derivation standards for EOA key derivation, and does not allow the user to export their private keys.
    • The wallet is an MPC wallet. By default, the user does not have sufficient key shares under self-custody to unilaterally control the account.
    • The wallet is an MPC wallet. By default, the user is in self-custody of sufficient key shares to unilaterally control the account. However, the user cannot generate a token transfer transaction without relying on an external provider.
    • The wallet is an ERC-4337: Account Abstraction for smart contract wallets (smart contract) wallet. The control logic of the smart contract is such that the user cannot update it to have the user's own private keys as the sole controlling keys of the account.
    • The wallet is an ERC-4337: Account Abstraction for smart contract wallets (smart contract) wallet. The user does not have full self-custodial control by default, and needs to rely on an external provider or proprietary software to change this.
    • The wallet is an ERC-4337: Account Abstraction for smart contract wallets (smart contract) wallet. The user has self-custodial control by default, but still needs to rely on an external provider or proprietary software to generate a valid token transfer transaction.
Can the wallet withdraw L2 funds to Ethereum L1 without relying on intermediaries?
UNRATED

Walletbeat's database does not have the necessary information on Cypherock Wallet to assess this question.

Please help us by contributing your knowledge on our repository!

GitHub Repository

Why does this matter?

One of the core tenets of Ethereum is censorship resistance. This means that users must be able to reliably get transactions included onchain, without the ability for intermediaries to prevent this from happening.

This property is critical to ensure that all Ethereum participants are provided equal-opportunity, unfettered access to Ethereum, and to ensure that Ethereum is resilient to attackers that would want to prevent others from using Ethereum on such footing.

In order to uphold this property on Ethereum L2s, users must be able to force transactions to be included on L2 chains as well. Most L2s implement such functionality by allowing L2 transactions to be submitted on the L1, and enforcing that their sequencing logic must respect such L1 force-inclusion requests by including them on the L2 chain, typically within some fixed duration.

By verifying that the wallet supports L2 force-withdrawal transactions, this attribute verifies censorship resistance at both levels: L1 and L2.

How is transaction inclusion evaluated?

Wallets are rated based on whether users need to trust any intermediary in order to withdraw their funds from L2s.

This fundamentally requires two major features:

  • A wallet must support the creation of an L1 transaction which forces the L2 to withdraw user funds back to the L1. This message is typically posted as an L1 transaction which forces the L2 sequencing process to take it into account.
  • Since L2 force-withdrawal transactions require an L1 transaction, the wallet must also be able to get this transaction included without relying on an external service to broadcast this transaction for block inclusion. Therefore, the wallet must also support either participating in Ethereum's L1 gossip network, or (for environments that do not support this such as browser extension wallets) support broadcasting L1 transactions through a user's self-hosted Ethereum node.

With these two features in place, users can withdraw their L2 funds without trusting intermediaries.

Walletbeat currently only considers OP Stack chains and Arbitrum One for this evaluation, but more L2 chains may be added as support for force-withdrawal transaction becomes feasible for them.


A few examples:
  • A wallet would get a passing rating if...

    • The wallet supports force-withdrawal transactions on L2s, and can be configured to broadcast this transaction using a user's self-hosted L1 node.
    • The wallet supports force-withdrawal transactions on L2s, and supports directly gossiping such transactions over the Ethereum L1 network.
  • A wallet would get a partial rating if...

    • The wallet supports force-withdrawal transactions on L2s, but requires the use of an external RPC provider to submit the L1 transaction that it would take to initiate this force-withdrawal transaction.
    • The wallet supports force-withdrawal transactions on some L2s, but not on all the L2s that are configured out of the box.
  • A wallet would get a failing rating if...

    • The wallet does not support force-withdrawal transactions on L2s.

Transparency

40%*
How transparent and sustainable is Cypherock Wallet's development model?
Is the wallet's source code licensed under a Free and Open Source Software (FOSS) license?
PASS

Cypherock Wallet is licensed under the MIT with Clause license, a Free and Open-Source (FOSS) license.

View License
  • Cypherock is open-source and reproducible

Why does this matter?

Free and Open Source Software (FOSS) licensing allows a software project's source code to be freely used, modified and distributed. This allows better collaboration, more transparency into the software development practices that go into the project, and allows security researchers to more easily identify and report security vulnerabilities. In short, it turns software projects into public goods.

How is source code license evaluated?

Wallets are assessed based whether the license of their source code meets the Open Source Initiative's definition of open source.


A few examples:
  • A wallet would get a passing rating if...

    • The wallet is licensed under a Free and Open Source Software (FOSS) license. Examples of such licenses include MIT, Apache, BSD, and GPL.
  • A wallet would get a partial rating if...

    • The wallet is licensed under a license that represents a commitment to switch to a Free and Open Source Software (FOSS) license by a specific date. Examples of such licenses include BUSL.
  • A wallet would get a failing rating if...

    • The wallet is licensed under any non-FOSS (proprietary) license.
    • The wallet's source code repository is missing a license file. The lack of a license file may be an accidental omission on the wallet developers' part, but also may indicate that the wallet may set its license to a proprietary license. Therefore, Walletbeat makes the conservative assumption that the wallet is not be Free and Open Open Source Software until it does have a valid license file.
Is the source code for the wallet visible to the public?
PASS

The source code for Cypherock Wallet is publicly viewable here.

View Source Code
  • Cypherock is open-source and reproducible

Why does this matter?

When using a wallet, users are entrusting it to preserve their funds safely. This requires a high level of trust in the wallet's source code and in the wallet's development team. By making the wallet's source code visible to the public, its source code can be more easily inspected for security vulnerabilities and for potential malicious code. This improves the wallet's security and trustworthiness.

How is source visibility evaluated?

Wallets are assessed based on whether or not their source code is publicly visible, irrespective of the license of the source code.
If a wallet's source code is visible, it passes. If not, it fails.
How is the wallet's development team funded?
UNRATED

Walletbeat's database does not have the necessary information on Cypherock Wallet to assess this question.

Please help us by contributing your knowledge on our repository!

GitHub Repository

Why does this matter?

Wallets are complex, high-stakes pieces of software. They must be maintained, regularly audited, and follow the continuous improvements in the ecosystem. This requires a reliable, transparent source of funding.

How is funding evaluated?

Wallets are assessed based on how sustainable, transparent, and user-aligned their funding mechanisms are.

Wallets are typically funded by one or more of the following methods:

  • Self-funding from developers
  • Seeking donations from users
  • Seeking grants from foundations
  • Venture capital funding
  • Charging fees on convenience functions (e.g. swapping and bridging tokens)
  • Governance tokens
  • Commemorative NFT sales

Walletbeat looks at each funding source of funding and verifies whether it is done transparently and in a user-aligned manner. In this context, "user alignment" refers to whether a source of funding grows as a function of the user's own goals, rather than being uncorrelated or anti-correlated. For example, funding acquired through hidden swap fees or governance token sales with undisclosed insider token allocations are not user-aligned. Funding acquired through transparent swap fees, user donations, or ecosystem grants are user-aligned.

In order to pass this criterion, wallets must have at least one source of funding, and all of their sources of funding must be transparent to users. Additionally, if the wallet is funded from multiple sources and some of these sources are not user-aligned, the public must be able to determine the proportion of each such funding source to the wallet's overall revenue. Depending on the funding mechanism, this can be done through publication of a revenue breakdown page, public regulatory filings, or token allocation and vesting disclosures.


  • A wallet would get a passing rating if...

    • The wallet is funded from user-visible swap fees and pre-disclosed governance token sales.
    • The wallet is funded from venture capital and publishes regulatory filings showing the amount raised in each round and the top investors of each round.
    • The wallet is funded from onchain donations, onchain ecosystem grants, and commemorative NFT sales.
  • A wallet would get a partial rating if...

    • The wallet is funded from hidden swap fees. While users can look this up onchain to see how much revenue the wallet is generating from this, making this funding source technically transparent, it is not user-aligned.
    • The wallet is funded from user-visible swap fees and governance token sales with undisclosed vesting schedule. While users can use onchain lookups to determine how much revenue is generated from both sources, making the funding technically transparent, the undisclosed nature of governance token makes makes this not user-aligned.
  • A wallet would get a failing rating if...

    • The wallet has funding but has not revealed this publicly and transparently to users.
    • The wallet does not have any funding. Wallets must have sustainable funding sources in order to remain secure and up-to-date.
Does the wallet clearly display all transaction fees and their purpose?
UNRATED

Walletbeat's database does not have the necessary information on Cypherock Wallet to assess this question.

Please help us by contributing your knowledge on our repository!

GitHub Repository

Why does this matter?

Fee transparency is crucial for users to understand the full cost of their transactions. Without clear fee information, users may be surprised by high transaction costs or hidden fees charged by the wallet.

Transparent fee disclosure helps users make informed decisions about when to transact and which wallet to use. It also builds trust between users and wallet providers by ensuring that all costs are clearly communicated upfront.

How is a wallet's fee transparency evaluated?

Wallets are evaluated based on how transparently they display transaction fees and transaction purposes to users.

A wallet receives a passing rating if it provides comprehensive fee information, including detailed breakdowns of network fees, clear disclosure of any additional wallet fees. Fees may be aggregated down to one number, but a breakdown must be available to the user within a single click.

A wallet receives a partial rating if it provides an aggregate fee but does not let the user get a detailed breakdown.

A wallet fails this attribute if it provides minimal or no fee information before transaction confirmation.

Various transaction types are tested: Ether and ERC-20 transfers on L1, built-in swaps or bridging transactions, DeFi transactions, private transactions if supported. If a wallet displays fees differently depending on the type of transaction, the transaction type with the least clear display level is taken into consideration for the purpose of this attribute.


A few examples:
  • A wallet would get a passing rating if...

    • The wallet displays the full transaction fee breakdown by default for all transaction types it supports.
    • The wallet displays an aggregate transaction fee for all transaction types it supports, and the user can get a full breakdown in just one click.
  • A wallet would get a partial rating if...

    • The wallet shows an aggregate transaction fee by default, but does not provide a full breakdown.
  • A wallet would get a failing rating if...

    • The wallet hides all or some of the transaction fees charged to the user.
Does Cypherock Wallet have a strong reputation for reliability and transparency?
UNRATED

Walletbeat's database does not have the necessary information on Cypherock Wallet to assess this question.

Please help us by contributing your knowledge on our repository!

GitHub Repository

Why does this matter?

A manufacturer's reputation reflects its track record in product design, long-term availability and support, handling of vulnerabilities, and engagement with the security community. A strong reputation builds user trust in the reliability and security of the hardware wallet.

How is a wallet's reputation evaluated?

Evaluated based on an aggregate of factors:

  • Product Originality: Degree of original design versus reliance on not-in-house components.

  • Availability & Support: History of product availability, risk of discontinuation, and perceived ability to honor warranty/support.

  • Vulnerability History: Track record of security vulnerabilities, their severity, and the transparency/quality of documentation and fixes.

  • Bug Bounty Program: Scope and rewards of the manufacturer's bug bounty program compared to industry standards.


A few examples:
  • A wallet would get a passing rating if...

    • The wallet passes most reputation sub-criteria.
  • A wallet would get a partial rating if...

    • The wallet passes some reputation sub-criteria.
  • A wallet would get a failing rating if...

    • The wallet fails most or all reputation sub-criteria.

Ecosystem

UNRATED
How well does Cypherock Wallet align with the ecosystem?
Is the wallet Account Abstraction ready?
UNRATED

Walletbeat's database does not have the necessary information on Cypherock Wallet to assess this question.

Please help us by contributing your knowledge on our repository!

GitHub Repository

Why does this matter?

User experience on Ethereum has historically suffered from the limitations of Externally-Owned Accounts (EOAs), which is the type of account most Ethereum users use today. By contrast, smart wallet accounts offer many UX and security improvements, such as the ability to:

  • Batch multiple transactions, removing the need for separate "token approval" transactions before every other token operation.
  • Pay gas fees in other tokens than Ether, or support sponsored transaction fees (with ERC-4337: Account Abstraction for smart contract wallets)
  • Delegate some operation to trusted provider, such as allowing onchain games to withdraw small amounts of tokens without signing pop-ups for each and every transaction.
  • Change transaction authorization logic, enabling the use of Passkeys (and cellphone authentication methods) for signing transactions.
  • Update the set of keys used to control the wallet, enabling the switch to quantum-resistant encryption algorithms in the future.
  • Define account recovery rules, reducing the risk of losing access to your account when losing a private key or a device.

However, smart wallet accounts have historically been an all-or-nothing, wallet-specific proposition for users. There was no transition path to such wallets.

As part of the Pectra upgrade, EIP-7702: Account Abstraction via smart contract authority delegation fixes this problem. It create a clean path for existing EOAs to obtain all the UX benefits of smart wallet accounts and account abstraction, without the need for users to switch to a different account address. This represents a large User Experience upgrade for all Ethereum EOA users.

How is account abstraction support evaluated?

Wallets are rated based on whether they make use of EIP-7702: Account Abstraction via smart contract authority delegation transactions (for EOA or MPC wallets), or if they support ERC-4337: Account Abstraction for smart contract wallets transactions (for smart contract wallets).

The user experience benefits of these enhancements are still in-flight and are expected to develop as these standards mature and are built on top of. As such, Walletbeat does not currently consider which improvements wallets provide for their users as a result of these new capabilities. However, it is expected that a future version of this attribute would look at such improvements. For example: to verify that users are able to update the signing authority of their wallets to a quantum-safe signature scheme.


Can you send funds to human-readable Ethereum addresses?
UNRATED

Walletbeat's database does not have the necessary information on Cypherock Wallet to assess this question.

Please help us by contributing your knowledge on our repository!

GitHub Repository

Why does this matter?

Ethereum addresses are hexadecimal strings (0x...) which are unreadable to humans. Phishing scams and exploits have used this to trick users into sending funds to invalid addresses, for example by generating lookalike-addresses and tricking users into copy/pasting them without noticing the difference.

Additionally, Ethereum's transition to layer 2 chains has changed user needs when sending funds. The hexadecimal address isn't sufficient anymore; the user needs to ensure that they are sending funds to the correct hexadecimal address on the correct chain, increasing the potential for mistakenly sending funds to the wrong place or the wrong chain.

Address naming registries like ENS partially solve this problem by allowing more human-readable names like username.eth to be automatically turned into the hexadecimal address. This is easier to share and to accurately transfer by humans. Additionally, some address format standards improve upon this further by including the destination chain information as part of the address itself. Such standards include:

Wallets that support either of these standards are able to automatically determine the destination address and chain from a human-readable string, and can bridge funds across chains as appropriate. This improves the user experience of Ethereum and its layer 2 ecosystem while reducing the potential for mistakes when sending funds.

How is address resolution evaluated?

Wallets are rated based on the types of addresses they support sending funds to.

Specifically, Walletbeat recognizes the following destination address formats:

Wallets must resolve either ERC-7828 or ERC-7831 addresses to fulfill this attribute. Support for plain ENS addresses alone earns a partial rating.

Additionally, the mechanism used to do the resolution must either:

  • Be done using onchain data and reusing the wallet's common chain interaction client, inheriting its verifiability (via light client) and privacy properties.
  • OR be done using an offchain external provider in such a way that the address returned by the external provider is verifiable, and without revealing the user's IP address to the provider. This ensures that:
    • The wallet cannot be tricked into sending funds to an attacker compromising the offchain provider's responses
    • The provider may not progressively learn the user's contacts list by associating its successive resolution queries by IP over time.

Does Cypherock Wallet work well with independent wallets and avoid supplier linkage?
UNRATED

Walletbeat's database does not have the necessary information on Cypherock Wallet to assess this question.

Please help us by contributing your knowledge on our repository!

GitHub Repository

Why does this matter?

Interoperability ensures the wallet can be used with independent wallets and does not leak identifying metadata to the supplier.

How is a wallet's interoperability evaluated?

Evaluated based on independent wallet compatibility and supplier independence.


A few examples:
  • A wallet would get a passing rating if...

    • The wallet passes both interoperability sub-criteria.
  • A wallet would get a partial rating if...

    • The wallet passes one interoperability sub-criteria.
  • A wallet would get a failing rating if...

    • The wallet fails one or both interoperability sub-criteria.

Maintenance

UNRATED
How well-maintained is Cypherock Wallet?
UNRATED Maintenance*contains unrated components

Attribute Details:

Does Cypherock Wallet have good maintenance practices?
UNRATED

Walletbeat's database does not have the necessary information on Cypherock Wallet to assess this question.

Please help us by contributing your knowledge on our repository!

GitHub Repository

Why does this matter?

Good maintenance practices ensure the long-term usability, reliability, and physical durability of a hardware wallet. This includes the device's resistance to physical damage, the availability of repair information and parts, battery longevity and replaceability, and the manufacturer's warranty policy.

How is a wallet's maintenance evaluated?

Evaluated based on:

  • Physical Durability: Resistance to drops and environmental factors.

  • MTBF Documentation: Availability and reliability of Mean Time Between Failures data.

  • Repairability: Ease of repair, availability of parts and documentation, and potential security implications of repairs.

  • Battery: Presence, replaceability, and device functionality if the battery dies.

  • Warranty: Length of warranty period, coverage limitations, and possibility of extension.


A few examples:
  • A wallet would get a passing rating if...

    • The wallet passes most maintenance sub-criteria.
  • A wallet would get a partial rating if...

    • The wallet passes some maintenance sub-criteria.
  • A wallet would get a failing rating if...

    • The wallet fails most or all maintenance sub-criteria.