Account System Security Enhancement
1. HyperLiquid Account Hierarchy
LeverAcc enhances HyperLiquid's native account structure through a multi-layered security model:

Key Relationships:
Master Account: Administrative entity with limited permissions:
Create sub-accounts
Generate API wallets
NO asset access or transfer capabilities
Sub-Accounts: Isolated trading environments:
Contract Trading Sub-Account (Perpetuals)
Spot Trading Sub-Account
Fully controlled by user wallet
API Wallets: Transaction execution proxies:
Limited to signing pre-authorized trades
Cannot withdraw funds
Automatically expire after 24 hours
2. User Wallet Binding Process
Secure account integration follows a strict verification protocol:
Step 1: Identity Verification
The user's wallet initiates the flow by requesting a new sub-account from the LeverAcc smart contract.
The contract interacts with HyperLiquid's MPC (Multi-Party Computation) system to generate a dedicated sub-account address.
HyperLiquid returns the newly created sub-account address to the contract.
To prove ownership, the contract sends a verification challenge back to the user's wallet.
The user signs this challenge with their wallet's private key and submits it.
The contract verifies the signature matches the original wallet address.
Once confirmed, the contract instructs HyperLiquid to permanently bind the user's main wallet to the sub-account.
Step 2: Dual Authorization System All critical operations require:
User wallet signature (ownership proof)
API wallet signature (execution authorization)
3. MPC-Enhanced Master Account Security
LeverAcc implements enterprise-grade protection for administrative functions:
Sharded Key Architecture
The keys are distributed into multiple network and physical place
AWS KMS (Tokyo)
Azure Key Vault (Frankfurt)
Google Cloud HSM (Iowa)
Physical HSM (Singapore)
User Cold Storage
Operational Workflow
Signature Request Initiation
User triggers account management action
System generates signature payload
Distributed Shard Activation

Signature Reconstruction
Combines shards via Lagrange interpolation
Validates complete signature
Executes authorized action
Immediately discards combined key
Security Enhancements Matrix
Key Storage
Single server
5-region sharding
Eliminates single point of failure
Authorization
API keys
Dual-signature binding
Requires active user consent
Access Control
Permanent tokens
24-hour API wallets
Limits exposure window
Recovery
Manual intervention
MPC shard rotation
Automated key regeneration
Auditability
Limited logs
Full on-chain records
Transparent operation history
Protection Mechanisms
Time-Limited API Wallets
Automatic expiration every 24 hours
Requires user reauthorization
Historical wallets become cryptographically inert
Geographic Dispersion
Key shards stored across 3 continents
Jurisdictional redundancy prevents regulatory seizure
Action-Specific Permissions
OperationRequired SignaturesCreate Sub-Account
3/5 MPC shards
Generate API Wallet
User + 2/5 MPC
Trade Execution
API Wallet only
Withdraw Funds
User wallet only
Compromise Response Protocol
Breach Detected:System identifies unauthorized access attempts or signature anomalies.
Shard Invalidation:Compromised shards (AWS/Azure/Google HSM nodes) are instantly revoked via broadcast.
New Shard Generation:MPC network regenerates fresh shards using distributed key generation (DKG).
User Re-Authentication:Owner must verify identity via MFA + cold storage signature.
Seamless Migration:Assets/contracts transfer to new shards with zero downtime.
Forensics & Patch:Attack vector analyzed using HSM/blockchain logs; security patches deployed.
Real-World Attack Mitigation
Scenario: Exchange Hot Wallet Compromise
Attacker gains access to exchange systems
Attempts to drain LeverAcc-connected accounts
Defense Response:
API wallets contain no withdrawal permissions
User funds secured in MPC-controlled sub-accounts
Withdrawal requires user's personal wallet signature
Unauthorized transfer attempts automatically blocked
Result: Zero funds lost despite exchange-level breach
This security architecture creates unprecedented protection: Users maintain complete control of their assets through personal wallet binding, while administrative functions benefit from military-grade MPC protection. The system ensures that even if multiple components are compromised, attackers cannot access funds or execute unauthorized actions.
Last updated