Non-custody architecture
Wildmeta maintains a strict non-custodial approach, ensuring users retain complete ownership and control over their assets while benefiting from sophisticated trading infrastructure and autonomous capabilities.
Ownership Principles
Wildmeta never takes custody of user assets under any circumstances. All wallet generation, key management, and asset control remain under user ownership through cryptographically secure mechanisms that prevent platform access to private keys or unauthorized asset movements.
User private keys are generated and stored using a combination of Trusted Execution Environment (TEE) and Secure Multi-Party Computation (SMPC) technologies. These approaches ensure that even Wildmeta infrastructure cannot access user credentials while maintaining the convenience of automated trading operations.
Asset control remains exclusively with users through smart contract design and cryptographic verification. All trading operations, transfers, and protocol interactions require user authorization through secure signature schemes that cannot be replicated or bypassed by platform infrastructure.
Direct Wallet Connection
Experienced DeFi users can connect existing wallets directly to Wildmeta, maintaining their preferred security setup while accessing advanced trading capabilities. This connection method preserves existing security practices and wallet configurations without requiring migration or key sharing.
Direct wallet connection enables immediate access to advanced features including perpetual trading, automated strategies, and cross-chain operations. Users maintain complete control over their existing security practices while benefiting from Wildmeta's sophisticated trading infrastructure.
Integration supports all major wallet types including hardware wallets, multisig setups, and other sophisticated security configurations. The platform adapts to user preferences rather than requiring standardized security approaches that might compromise existing practices.
Social Authentication Security
Social login options including email, Apple ID, and Google authentication provide convenience without compromising security principles. These methods trigger secure wallet generation processes rather than creating custodial relationships.
Email verification serves as the primary authentication mechanism, requiring only verification codes without registration processes or personal information collection. This approach minimizes privacy exposure while enabling secure account recovery and access management.
Generated wallets through social authentication utilize the same security infrastructure as directly connected wallets, ensuring equivalent protection regardless of authentication method. Users receive identical ownership guarantees and control capabilities across all authentication approaches.
Key Exportability
All generated private keys remain fully exportable, ensuring users can migrate to different platforms or security solutions without losing asset access. This portability guarantee prevents vendor lock-in while encouraging user confidence in the platform.
Export processes provide multiple format options including standard private key formats, mnemonic phrases, and hardware wallet compatible exports. Users can choose formats that align with their preferred security practices and backup procedures.
Detailed export instructions and security recommendations help users transition safely while maintaining best practices for private key management. The platform provides educational resources without mandating specific security approaches.
Audit and Verification
Smart contract architecture enables independent verification of non-custodial claims through open-source code review and formal auditing processes. Users and security researchers can examine contract logic to confirm the impossibility of unauthorized asset access.
Cryptographic proofs demonstrate the separation between platform functionality and asset control, providing mathematical guarantees rather than relying solely on policy commitments. These proofs enable trustless verification of security claims.
Regular security audits by independent firms provide additional assurance of continued non-custodial operation. Audit reports and findings are published transparently to maintain community confidence and accountability.
Last updated