SettleMint
ArchitectureFlows

Signing Flow

How DALP moves an EVM transaction from a verified user or API request through compliance simulation, custody signing, provider policy review, and broadcast.

System context

The signing flow is the shared path for DALP operations that write to an EVM network. DALP first verifies that the caller is allowed to submit the request, then the Execution Engine builds the transaction, the SMART Protocol compliance model is checked before signing, and the configured custody provider signs before broadcast.

Rendering diagram...

See also: Wallet verification | Key Guardian | Transaction Signer | Identity & compliance


Overview

Standard DALP transactions pass through three checks before reaching the blockchain:

  1. Request controls - DALP authenticates the caller, checks authorization, and applies wallet verification when a user session submits an operation that needs a blockchain signature. API-key integrations authenticate through the API key path instead of user wallet verification.
  2. On-chain compliance - the SMART Protocol verifies identity claims, transfer restrictions, and supply limits via simulation.
  3. Custodian policy - the configured custody provider applies operational controls such as amount limits, multi-party approval, or hardware-backed quorum before signing.

For normal transfers, minting, redemption, and similar lifecycle operations, the applicable request controls, compliance checks, and custody policies must pass before the transaction completes. Custodian-only exception operations, such as forced transfers, use the custodian role and bypass standard transfer-compliance checks by design. Treat those operations as exceptional servicing controls, not as ordinary transfer flows.

End-to-end sequence

Rendering diagram...

Flow steps

  1. Submit the request - DALP authenticates the caller and checks the permission required for the operation. User-session writes that need a blockchain signature include wallet verification evidence. API-key integrations use API-key authentication and do not prompt for a user's PIN, OTP, or backup code.

  2. Prepare the transaction - The accepted operation enters the Execution Engine, which builds the payload, estimates gas, and assigns a nonce. No signing or state change occurs yet.

  3. Run the compliance pre-check - The engine simulates canTransfer via eth_call. The simulation checks identity claims, compliance modules, and amount or volume limits without spending gas. If the simulation reverts, DALP surfaces the failure immediately.

  4. Route through the unified signer - The Transaction Signer delegates to a provider-agnostic layer that supports approved custody backends and local signing modes. Switching the configured backend changes provider setup, not the transaction flow.

  5. Apply custody provider policy - The active provider evaluates its own policy rules before signing. Custody backends can combine key shares, enforce approval workflows, or require hardware-backed quorum before returning a signature.

  6. Check signed payload integrity - For sign-only custody paths that return signed EVM bytes after an approval step, DALP validates the signed transaction before broadcast. The signed payload must match the original transaction request for nonce, destination contract, calldata, chain ID, optional value, and signer address. If any field differs, DALP refuses to broadcast the payload.

  7. Broadcast and execute on-chain - The validated signed bytes are submitted via eth_sendRawTransaction. The node returns the transaction hash for those submitted bytes. DALP records that hash, waits for the matching receipt, and only then marks the operation complete. The compliance engine enforces canTransfer again on-chain. If compliance state changed between simulation and broadcast, the transaction reverts.

Payload integrity before broadcast

DALP treats custody approval as permission to sign a specific EVM payload. It is not permission to broadcast any signed bytes returned later. On async sign-only custody paths, the platform parses the signed transaction after approval. The signed transaction must match the prepared request before it reaches the RPC node. DALP submits those validated bytes to the node and records the transaction hash returned for that submission. If durable execution replays after the node already accepted the transaction but before the hash was recorded, DALP derives the same hash from the validated signed bytes and continues confirmation instead of broadcasting a different payload.

CheckWhat DALP verifiesWhy it matters
NonceThe signed transaction uses the nonce reserved for the sender and chainPrevents a stale or substituted payload from consuming the wrong nonce lane
DestinationThe to address matches the contract selected by the original operationPrevents a signature for one target from being replayed against another target
CalldataThe function data matches the prepared operationPrevents a changed method call or changed arguments from being broadcast after approval
Chain IDThe signed transaction carries the expected EVM chain IDPrevents cross-chain replay of an approved payload
ValueWhen the original request includes native value, the signed payload carries the same amountPrevents payable value substitution on the same nonce and calldata
SignerThe recovered signer address matches the wallet that owns the nonce reservationPrevents a payload signed by another key from completing the reserved transaction
Broadcast hashThe transaction hash is recorded from the node response for the validated signed bytesBinds completion tracking and receipt lookup to the payload that DALP submitted

If validation fails, DALP fails the operation before broadcast. If broadcast succeeds but the journal replays before the transaction hash is recorded, DALP can recover the already-known transaction hash from the same validated signed bytes and continue confirmation without reusing the nonce reservation.

Control model

LayerWhere enforcedWhat it controlsConfigured by
Request controlsDALP API and Asset Console request pathAuthentication, authorization, participant and executor selection, wallet verification for user-session signing requestsPlatform administrators and user security settings
On-chain complianceSMART Protocol contractsIdentity/KYC claims, country restrictions, blocklists, supply caps, investor counts, time locks, volume modulesIssuer / compliance manager via DALP API
Custodian policiesConfigured custody provider policy and quorum controlsPer-transaction amount limits, rolling spend limits, approver workflows, IP/time restrictions, destination allowlists, quorum approvalOperations team in the custody provider control surface

Key invariants:

  • Request controls reject unauthenticated, unauthorized, or unverifiable user-session requests before the signing flow starts.
  • On-chain compliance enforces regulatory transfer rules at protocol level for standard token lifecycle operations.
  • Custodian policy provides operational controls and approval workflows at infrastructure level.
  • Standard token operations must pass each applicable control layer before they complete.
  • Custodian-only exception operations, including forced transfers, do not follow the standard canTransfer compliance path. Use them only for controlled servicing cases where the custodian role is authorised to intervene.
  • On-chain amount limits (via custom compliance modules) are auditable on-chain; custodian limits are off-chain operational controls.

Failure modes

Failure pointCauseResolution
Request rejectedAuthentication, permission, wallet setup, or wallet verification failedCheck the caller, role, participant/executor, and wallet verification method
Simulation revertOn-chain compliance module blocked the transactionCheck compliance status, claims, and module configuration
Custodian policy blockTransaction exceeds custodian amount limit, provider rule, or quorum policyAdjust policy thresholds or request approval
Pending approval timeoutApprovers have not completed the provider approval requestEscalate or configure auto-reject after timeout
Signed payload mismatchSigned bytes do not match the prepared nonce, target, calldata, chain, value, or signerTreat as failed before broadcast and review the custody approval record
Signing failureNetwork, provider, or custody backend issueAutomatic retry with exponential backoff
Broadcast failureGas underpricing or nonce conflictTransaction Signer resubmits with increased gas
On-chain revertCompliance state changed between simulation and broadcastSurface revert reason; re-evaluate compliance

See also

On this page