Security Model
Security is foundational to Sovra AI's design as it operates as both a non-custodial crypto wallet and an autonomous AI trading assistant. The system employs a multi-layered security architecture to protect user assets, personal data, and transactional integrity—without compromising user experience.
Private Key Storage (Mobile Secure Enclave) Sovra AI uses native mobile device security features to safeguard private keys:
On iOS, private keys are stored in the Secure Enclave; on Android, they reside in Trusted Execution Environments (TEE).
Keys are never transmitted off-device or exposed to Sovra servers.
All on-chain transactions (e.g., trade execution, staking, swaps) are signed locally using these device-stored keys.
This ensures full user custody and eliminates centralized key management risks.
Biometric Login, MFA, and Encrypted Backup Access control to the Sovra app and wallet is protected through:
Biometric authentication (Face ID, fingerprint) for instant yet secure login.
Optional Multi-Factor Authentication (MFA) tied to email, phone, or authenticator apps.
Encrypted backup of wallet seed phrases and configurations using user-defined passwords, stored either locally or on decentralized storage (e.g., IPFS or iCloud/Drive with encryption).
These layers help protect against device loss, theft, or unauthorized access.
Trade Approval Verification Before executing any on-chain operation, Sovra AI ensures user consent by:
Requiring explicit approval for each transaction in Manual or Semi-Auto modes.
Displaying trade summaries in human-readable format, including token symbols, amounts, estimated gas, and intent.
Offering adjustable limits, such as daily trading caps, asset-specific confirmations, and strategy locks (e.g., AI cannot trade over 10% of a portfolio without user approval).
This model balances automation with user sovereignty.
ML Anomaly Detection on Transaction Patterns To defend against wallet compromise, insider threats, or rogue AI behavior, Sovra AI employs real-time anomaly detection:
Machine Learning models continuously monitor transaction metadata (e.g., frequency, asset class, amount, destination address).
If an outlier or suspicious pattern is detected—such as an unusually large transfer, sudden token approval, or rapid sequence of trades—the system will:
Automatically pause AI automation.
Alert the user with a detailed explanation and recommended next steps.
Require additional authentication or approval before resuming.
This proactive layer provides dynamic, behavior-based security that evolves as user activity and market conditions change.
🛡️ Summary: Sovra AI’s security model is designed to be as autonomous and intelligent as the trading logic it powers—giving users both full control and smart protection in one unified experience.
Layers:
Hardware-level key storage (no third-party access)
Biometric and MFA access control
Clear and customizable trade consent flows
Adaptive, AI-powered fraud and anomaly prevention
This approach ensures Sovra is not only powerful—but trustworthy.
Last updated