Permissions
Chain Wallet adopts a Role Separation permission model that strictly separates execution authority from governance authority, preventing single points of failure or any single role from having uncontrolled influence over wallet assets or governance structures.
The system defines only two roles:
- Executor
- Manager
I. Executor
Executors are responsible only for initiating transaction execution and hold no wallet governance or consensus-related permissions.
1. Permission Definition
Allowed
- Initiate standard transaction requests
- Including on-chain actions such as transfers and smart contract interactions
Prohibited
-
Modify any wallet governance-related state
- Add, remove, or replace Executors or Managers
- Modify wallet security status
- Change any risk control configuration
-
Participate in any multisignature-related operations
- Create multisig transactions
- Approve multisig transactions
- Execute multisig transactions
All transaction requests initiated by Executors are subject to the system’s security validation and permission checks and cannot bypass them.
In the next chapter, we will focus on security validation, namely risk control.
2. Permission Examples
-
Executor attempts to add a new Executor
❌ Insufficient permissions — operation rejected
-
Executor attempts to remove a Manager
❌ Insufficient permissions — operation rejected
II. Manager
Managers are responsible for wallet governance, security configuration, and collective decision-making for high-risk operations.
1. Permission Definition
Allowed
-
Wallet governance operations
- Add, remove, or replace Executors and Managers
- Manage wallet security status
-
Multisignature operations
- Create multisig transactions
- Approve multisig transactions
- Execute multisig transactions
Constraints
- Any high-risk operation involving asset transfers or wallet governance
- Cannot be completed by a single Manager
- Must reach consensus through a multisignature mechanism
2. Permission Examples
-
Manager removes an Executor identified as risky
✅ Allowed, but must be completed via multisignature
-
Manager attempts to independently transfer assets
❌ Not allowed — must be completed through multisignature
III. Permission Boundary Summary
-
Executor
- Can never influence wallet governance structures
- Can never participate in multisignature decisions
-
Manager
- Can never unilaterally control assets or governance outcomes
-
Any critical operation
- Cannot be completed by a single role or a single key
IV. Design Principles Summary
- Principle of Least Privilege
- No Privilege Escalation
- Multi-Party Consensus for High-Risk Operations
This permission model provides a clear, auditable, and non-bypassable security boundary for the subsequent risk control system and multisignature mechanism.