Custody Model
KEK operates entirely under a non-custodial custody model.
At no point does KEK take possession of user funds, private keys, or signing authority. User assets remain under user control at all times, and execution can only occur through explicit, user-approved authorization.
This page explains how custody is maintained, where execution occurs, and what control remains with the user throughout the KEK system.
What this page covers
- How non-custodial custody is enforced
- How wallets interact with the system
- How execution is authorized
- Where KEK's authority explicitly ends
Core custody principle
User funds remain under user control at all times.
Non-custodial custody means the user retains control of their assets by controlling their private keys rather than relying on a third party to hold them.
KEK cannot:
- Access private keys
- Move funds independently
- Freeze balances
- Initiate transactions without authorization
Custody is never delegated to KEK.
How custody works in practice
User wallets
All assets remain in user-controlled wallets. KEK interfaces with wallets only to:
- Display account and position information
- Request explicit transaction approval for any execution-related action
KEK does not store keys, seed phrases, or wallet credentials.
Transaction authorization
Every transaction requires an explicit wallet signature from the user.
This includes actions such as:
- Strategy deployment authorization
- Trade placement
- Position modification
- Permission updates (where applicable)
No background execution is permitted. KEK cannot "sign on behalf of the user," and cannot execute without user confirmation.
Smart contract execution
When execution is authorized, transactions are routed through smart contracts and/or execution-layer infrastructure. These execution components:
- Are external to KEK's strategy intelligence and validation systems
- Execute according to predefined protocols
- Cannot be triggered without user approval
- Do not grant KEK custody or unilateral signing authority
KEK does not intermediate transactions or custody assets during this process.
Execution infrastructure boundary
KEK connects to execution infrastructure as an interface layer, while custody and settlement remain external.
KEK DEX execution layer
KEK DEX is Omnichain and built on Orderly Network's decentralized exchange infrastructure layer. Orderly is designed as an omnichain decentralized orderbook protocol providing trading infrastructure and shared liquidity for builders.
This means:
- KEK provides the execution interface
- Orderly provides the underlying exchange-layer infrastructure
- Users provide authorization through their wallet
- Custody remains non-custodial throughout
Where KEK's authority ends
KEK's authority ends at the point where a wallet signature is required.
KEK cannot:
- Withdraw user funds
- Reallocate assets without the user
- Override wallet permissions
- Execute trades autonomously
- Intercept, redirect, or rewrite authorized transactions
These limitations are structural, not policy-based.
User responsibility
Because KEK is non-custodial, users retain sovereignty—and responsibility.
Users are responsible for:
- Wallet security and recovery phrase protection
- Reviewing all requested approvals and signatures
- Controlling when execution is enabled or disabled
Non-custodial custody reduces counterparty risk, but places security ownership on the user.
KEK does not assume fiduciary responsibility for user execution choices.
Security considerations
KEK's custody model reduces operational risk by:
- Eliminating centralized custody and withdrawal attack surfaces
- Requiring explicit user authorization for execution
- Maintaining separation between intelligence, validation, and execution systems
- Applying least-authority design principles (components only have the minimum access required for their role)
This model does not eliminate:
- Market risk
- Smart contract risk in third-party infrastructure
- User error (incorrect approvals, unsafe wallets, compromised devices)
How this fits into the KEK system
Custody boundaries apply across the full strategy lifecycle:
Strategy Generation → Validation & Paper Trading → Monitoring & Refinement → Optional Execution
At no point does KEK assume custody. Execution is optional and always permissioned.
Why this matters
This custody model ensures:
- Clear responsibility boundaries
- Reduced operational and counterparty risk
- User sovereignty over assets
- Alignment with non-custodial principles
KEK is designed so that trust is minimized — not required.