PollarPollar
Core Concepts

Security Model

Goals

  1. Avoid mixing sponsor key usage with general app logic.
  2. Minimize exposure of user signing material.
  3. Keep sponsorship rules explicit and auditable.
  4. Make failure states observable.
  5. Keep v1 realistic and shippable.

v1 baseline

  • Sponsor keys are only used through the Signer Boundary (isolated service).
  • Sponsorship policy is checked before preparing transactions.
  • Tenant config defines allowed assets and fee rules.
  • All sponsor actions are logged.
  • Passkey-backed signing can be enabled where supported.
  • Contract-ready flows do not require the platform to hold raw user keys in the normal path.

Key separation

App Frontend → Pollar API → Relay / Sponsor Service → Signer Boundary → Sponsor key use
User signer / passkey → App (separate from Signer Boundary)

The user signs with their own signer or passkey; the sponsor key is used only in the Signer Boundary for sponsorship operations.

Threats and mitigations

ThreatMitigation
Sponsor key leakageIsolated Signer Boundary, limited access, rotation plan
Over-sponsorshipPer-app controls, asset allowlist, analytics and alerts
Invalid contract callsSDK validation, simulation, typed helpers
Deferred activation abuseIdempotent endpoints, wallet status checks, audit logs

On this page

Was this helpful?