The service must store 256-bit private keys, sign transactions for EVM networks, and have activity logs. Keys must be shared uniquely, with the ability to revoke compromised keys.
Limiting each key's scope is an additional requirement for the service. Two options to solve the problem are discussed, involving a master key or creating separate key instances.
Collection
[
|
...
]