Session Keys

Sail uses Session Keys to execute on your behalf without broad, permanent authority.

  • Least privilege: Keys only cover approved actions and assets.

  • Explicit consent: The first time you use Sail, you sign the permissions that allow the agent to act. Any new integration (yield source, network, stablecoin, or operation) requires a fresh signature from you.

  • Bounded risk: Notional caps, frequency limits, and hard allow-lists prevent abuse.

  • Short-lived & rotatable: Keys expire and can be rotated. Revoking them halts all agent activity until new permissions are signed.

  • Defense in depth: Off-chain policy checks mirror on-chain guards to catch malformed or out-of-policy transactions before they’re sent.

If a key were ever compromised, its scope and expiry contain the impact. Since users must re-sign when new powers are added, there is no silent privilege creep.

Last updated