1. Ensure API key security

Currently, Cobo uses the asymmetric Elliptic Curve Digital Signature Algorithm (ECDSA). Clients will need to first generate a local key-pair (i.e., public and private keys) and then inform Cobo about the public key. Cobo will use this public key to verify whether a request from the client has a corresponding private key signature. We strongly recommend using Cobo’s SDKs, which come with built-in signature verification logic. Click here to download Cobo’s SDKs.

If you choose not to use Cobo’s SDKs for WaaS API calls, please refer to this link for a better understanding of Cobo’s API authentication mechanism. Aside from the public API endpoints, Cobo requires that each API call request be signed. The api_key corresponds to your public key and must be manually added on Cobo Custody Web. The api_secret represents your private key and should be securely stored. You can use Cobo’s SDKs to create the corresponding api_secret and api_key.

For API key security, we recommend the following best practices:

  • Generate and store api_key and api_secret on a trusted device. We recommend encrypting the api_secret and then decrypting it during use to ensure it is never transmitted between other servers, networks (e.g., Telegram or instant messengers), or individuals.
  • Add IP whitelists. Note that Cobo only accepts requests from designated servers.

2. Ensure the security of TSS Node and MPC key-shares

The TSS Node is a program for managing MPC key-shares. To ensure the secure maintenance of your TSS Node, please follow the security practices below:

  • Cobo offers three deployment methods for the TSS Node. The generic version is suitable for regular Linux servers or Apple Macbooks, and a version specifically tailored for deployment on Intel® Software Guard Extensions (SGX) servers is also available. For optimal security, we recommend using SGX servers.
  • During the installation process, the TSS Node requires access to Ubuntu APT and Docker.io image repositories. Ensure to grant the associated network permissions and promptly revoke them following the TSS Node initialization. When generating root extended public keys, MPC key-shares, and transaction signatures, the TSS Node will interact with Cobo’s servers through the public network. Kindly ensure that the relevant network permissions are only open during these specific processes and are promptly closed afterward.
  • During the initialization of the TSS Node, you will be required to enter a password for encrypting the MPC key-share database. We recommend using a password manager (e.g., 1Password, Bitwarden) to generate a complicated password between 16 to 32 characters. The password must be kept secure at all times.
  • The MPC key-share database file and the corresponding password must be backed up.We recommend storing them separately on different secure devices, with strict restrictions for accessing these devices:
    • Apply additional encryption to all backup data
    • Use a secure hardware-encrypted USB drive for backup
    • Store backup devices in a secure deposit box and restrict access permissions
  • Cobo offers dedicated callback services for TSS Node. We strongly recommend deploying and configuring these callback services on a separate server, different from the one hosting the TSS Node. For security reasons, make sure to activate callback services for all transactions.
  • Cobo will regularly update TSS Node software packages to introduce new features and performance enhancements. For optimal functionality and security, ensure that your TSS Node is always running the latest version.

3. Proper use the ‘request_id’ field in withdrawal requests

The ‘request_id’ serves as the unique identifier for each withdrawal request, corresponding to a specific withdrawal action. This ensures that even in the event of network issues, duplicate withdrawal requests sent to Cobo will be rejected due to the repeated ‘request_id’. We recommend using a Universally Unique Identifier (UUID).

4. Properly configure withdrawal confirmation callbacks

  • The callback URL designated by the client should be hosted on a server isolated from the one storing the API private key to minimize the risk of a single point of failure. For instance, it could be a dedicated server hosting a risk control engine. We have noticed instances where clients either fail to validate withdrawal requests or use callback URLs located on the same server that initiates withdrawal requests.
  • Please conduct verification for all withdrawal requests:
    • a.Check if request_id, coin, to_addr, amount, etc., are valid and consistent with your business requests.
    • b.Verify high-risk withdrawal behaviors through internal risk control audits. This may involve server security checks, user confirmation for withdrawal authenticity, and more.
  • Use the HTTPS protocol and enable two-way verification to prevent man-in-the-middle attacks. For Cobo’s callback messages, verify the signature using Cobo’s public key. We strongly recommend using Cobo SDKs, as they come embedded with default signature verification logic.
  • Validate the timestamp carried in the request header to be close to the local server’s time. An alert should be triggered if the difference exceeds a specific threshold.
  • Cache signature information for a specific period to identify duplicate signatures. If repeated signatures are detected, implement appropriate risk control measures or contact us at [email protected] to safeguard against replay attacks.

5. Properly configure transaction notification callbacks

  1. Upon receiving a push message from Cobo, please call the transaction querying endpoint and use the specific ‘id’ field to validate the transaction. Do not rely solely on push messages for deposit and withdrawal confirmations.
  2. Due to unpredictable factors such as network delays, a callback may be repeated. We recommended using the ‘id’ field as the unique identifier for each transaction and employing database read-write locks to prevent duplicate accounting.
  3. Please use the HTTPS protocol and enable two-way verification to prevent man-in-the-middle attacks. For Cobo’s callback messages, verify the signature using Cobo’s pubkey. We strongly recommend using Cobo SDKs, as they come embedded with default signature verification logic.

6. Configure risk control rules and set up Cobo Guard

Cobo offers a flexible and configurable set of risk control strategies to safeguard your digital assets. Currently, it supports six types of strategies:

  1. Manage all withdrawals: In the event of abnormal business activity, you can swiftly tighten wallet controls by configuring a rule that subjects all withdrawal requests to review.
  2. Manage all withdrawals initiated via APIs
  3. Manage all withdrawals initiated via the Cobo Custody Web
  4. Manage withdrawals to addresses not in the whitelist
  5. Manage withdrawals to addresses in the whitelist
  6. Set withdrawal limits (i.e., per transaction, per hour, per day): Please set a threshold based on your specific business requirements

Different risk control strategies can be combined with various control actions to create flexible and customized risk control rules. Control actions include automated approval, automated rejection, and assigning a specified number of approvers for review. For instance, you can require approval from any one of four approvers for a transaction, or require approvals from at least two out of four approvers for a withdrawal exceeding $10,000.

To adjust the priority of your risk control rules, use the up/down arrow under the ‘Operations’ tab. These rules will be applied sequentially from priority 1 to n. If a withdrawal triggers multiple risk control rules, the one with the highest priority will be executed.

Important note: After editing your risk control rules, click ‘Save Changes’ and approve the request on your Cobo Guard.You can then refresh the page to verify if the rules are in effect. We also recommend conducting a test transaction to ensure that the rules align with your business requirements.

7. Safeguard your Cobo Custody account and Cobo Guard

  1. Refrain from using easily crackable, simple passwords and avoid storing passwords casually, such as in browser auto-fill. When setting up 2FA or Cobo Guard, exercise caution not to disclose the QR codes or secrets (e.g., ensure there are no others nearby, avoid sending them through screenshots).
  2. Never share your password or 2FA with anyone, including colleagues or Cobo staff. Note that Cobo staff will never request your password or 2FA in any form.
  3. Stay vigilant against phishing websites and take note of the official Cobo Custody website: https://home.custody.cobo.com/. You can also set up an anti-phishing phrase on the Cobo Custody Web by navigating to “Settings - Anti-Phishing Code”. This phrase will be visible in the upper-right corner of the webpage after each login.
  4. Never lend a device with Cobo Guard to others or disclose your iPhone password. Ensure that a password or biometric unlock is always required when using a device with Cobo Guard.

8. Properly configure permissions to prevent internal collusion and malicious activities.

Exercise caution when granting advanced roles such as admins, approvers, and withdrawers. Admins have the authority to perform high-risk operations, including team and wallet management, risk control configurations, and more. We recommend that you grant admin roles to only the organization owner. Additionally, ensure the separation of duties by assigning the withdrawer and approver roles to different individuals.