Configurations
The embedded risk control module can be configured through theconfigs/cobo-tss-node-config.yaml
file. The configuration defines rules for the following task requests:
- Key generation (KeyGen): Creating new key shares for MPC Wallets
- Key signing (KeySign): Signing transactions or messages
- Key resharing (KeyReshare): Redistributing key shares among participants
enable
: Enable or disable the embedded risk control mechanismkey_gen.reject_all
: If true, reject all key generation requestskey_sign.reject_all
: If true, reject all key signing requestskey_share_sign.reject_all
: If true, reject all requests to sign messages for key share verificationkey_reshare.reject_all
: If true, reject all key resharing requests<key_gen>.allow_list
or<key_reshare>.allow_list
: List of allowed key generation or resharing configurationsxpubkey
: Root extended public key for key resharingnew_threshold
: The new signature thresholdnew_node_ids
: Node IDs of the parties allowed in key resharing
<EXTENDED_ROOT_PUBKEY>
: The MPC Wallet’s root extended public key<Cobo TSS Node ID>
: Cobo’s TSS Node ID<Customer TSS Node ID>
: Your TSS Node ID<ThirdParty TSS Node ID>
: A third-party TSS Node ID
Security recommendations
- While the embedded risk control mechanism provides basic security, it’s strongly recommended to also implement the callback mechanism for additional custom risk controls. This combination offers a more comprehensive and flexible risk management strategy.
- Regularly review and update your risk control configurations
- Test your configurations in a development environment before deploying to production
Next steps
Feel free to share your feedback to improve our documentation!