Aegis Treasury
search
notifications security account_balance_wallet

Documentation Hub

Expert guidance for institutional-grade digital asset custody. Explore technical specifications, policy frameworks, and cryptographic security protocols.

terminal Deep Dive

Technical Specifications

Understand our implementation of ZK-proofs, TEE (Trusted Execution Environments), and the underlying architecture of Aegis Treasury.

Read the Whitepaper arrow_forward
security
rocket_launch

Getting Started

Configure your organization's first vault in less than 5 minutes. Step-by-step onboarding for administrators.

  • Account Initialization
  • Key Management Basics
  • Inviting Team Members
gavel

Policy Configuration

Define complex governance structures, spending limits, and whitelisting requirements.

build_circle

Troubleshooting

Resolve common transaction errors, network sync issues, and policy conflicts.

Popular Resources

description

Understanding ZK-Proofs in Aegis

Technical Spec • 12 min read

chevron_right
verified_user

Hardware Security Modules (HSM) Integration

Infrastructure • 8 min read

chevron_right
hub

Multi-Signature Governance Frameworks

Policy • 15 min read

chevron_right
error

Handling 'Policy Rejected' Transaction Errors

Troubleshooting • 5 min read

chevron_right
Need direct assistance?

Our priority support team is available 24/7 for Enterprise Tier organizations.

Network Health
Core Settlement Layer
OPERATIONAL
ZK-Proof Aggregator
OPERATIONAL
Vault API Services
OPERATIONAL
Cryptographic Foundation

Zero-Knowledge Governance and TEE Enforcement

Aegis utilizes cutting-edge privacy-preserving computations to ensure policy validation happens in secret, verifiable environments before hitting the blockchain.

Recursive SNARKs

Aggregating complex policy approvals into a single succinct proof to minimize gas costs and maximize throughput without sacrificing security.

VIEW MODULES chevron_right

TEE Hardening

Ensuring transaction signing keys are never exposed in plaintext, even to Aegis administrators, through Intel SGX and Nitro Enclaves.

VIEW ARCHITECTURE chevron_right

Threshold ECDSA

Removing the single point of failure by distributing private key fragments across multiple non-colluding nodes in our secure network.

VIEW PROTOCOL chevron_right