Non-custodial · Open source · Independently audited

Sei Wallet security: your keys, your SEI, your control

Sei Wallet is non-custodial and fully open source. The seed phrase never leaves the user's device, Sei Wallet Labs Inc cannot freeze or move funds, and an independent security audit plus a public bug bounty back every release.

  • Open source
  • Free & open license
  • Independent audit
  • Signed builds

Six things, each verifiable

1.

Open source

Every line of Sei Wallet source code is published under the Apache 2.0 license. Read the source, build it locally, verify your hash matches the published binary.

2.

Signed binaries

Windows: DigiCert code-signing certificate issued to Sei Wallet Labs Inc. macOS: Apple Developer ID + Apple notarization. Linux: PGP-signed SHA256SUMS.asc against our published key.

3.

Independent audit

In progress. Auditor name, scope, and ETA are published on the audit page. Full report and remediation notes published when complete.

4.

Non-custodial

Your seed phrase is generated on your device, encrypted on your device, never transmitted. We can't move, freeze, or recover your funds — and neither can anyone else with access to our infrastructure.

5.

Bug bounty

Public program paying up to $25,000 for critical findings. Coordinated disclosure. Researchers credited publicly with consent. See the table below.

6.

What we don't do

No telemetry tied to your identity, no wallet-address fingerprinting, no third-party trackers, no in-wallet ads, no token-promotion deals. The wallet is the product; you are not.

Verification artifacts

Source repo
github.com/seiwalletlabs/sei-wallet — Apache 2.0
Security email
security@seiwallet.net
security.txt
https://seiwallet.net/.well-known/security.txt
GitHub SECURITY.md
github.com/seiwalletlabs/sei-wallet/blob/main/SECURITY.md

All disclosure channels are listed across this page, GitHub SECURITY.md, and /.well-known/security.txt — they must agree. If they disagree, the page you're reading is compromised — close it.

Bug bounty program

Up to $25,000 for critical findings. Coordinated disclosure. Email security@seiwallet.net, ideally PGP-encrypted. Acknowledgment within 72 hours.

SeverityPayout (USD)Examples
Critical$5,000 – $25,000Remote seed extraction, transaction substitution, signed-build bypass.
High$1,000 – $5,000Local privilege escalation that exposes wallet state, address-spoofing in UI.
Medium$250 – $1,000Signature-display ambiguity, denial-of-service on wallet startup.
Low / Informational$50 – $250Hardening recommendations, dependency advisories with mitigations in place.

In scope

  • Sei Wallet desktop binaries (Windows, macOS, Linux)
  • Sei Wallet source code at github.com/seiwalletlabs/sei-wallet
  • seiwallet.net web infrastructure (download, signature distribution)
  • Wallet-internal RPC endpoints and signing flows

Out of scope

  • The Sei chain itself (not our codebase)
  • Third-party dApps loaded inside the wallet
  • Social-engineering attacks against Sei Wallet Labs staff
  • Issues already documented in published audit findings

Go deeper

Who builds this

Sei Wallet is built by Sei Wallet Labs Inc, an independent New York company. Read about the team and entity.

Frequently asked questions