ByAUJay
Summary: So, here’s the deal: a lot of “multisig recovery” guides really fall short when you need them most. You might run into issues like missing guardians, L2 finality windows, random HSM signatures, and the lack of alerts when a recovery kicks off. In this post, I’m sharing a solid, enterprise-grade procedure that’s been tested and refined for regaining admin control on Safe{Wallet}-style multisigs. This includes time-delayed recovery, HSM/MPC signers, and automated monitoring that meets SOC 2 and procurement requirements.
Recovering Admin Access: Multisig Recovery Procedures
Enterprise (CISO, Crypto Ops, Procurement)
In today’s fast-paced environment, security and compliance are more important than ever. To meet these challenges head-on, we’ve laid out a framework that focuses on several key areas.
Key Compliance Standards
We prioritize adhering to essential standards like SOC 2 Type II and ISO 27001. These frameworks not only ensure that we're protecting our users' data but also set us apart as a trusted enterprise.
Segregation of Duties
One critical piece of our security puzzle is the Segregation of Duties (SoD). By separating responsibilities, we minimize risks and ensure that no individual has too much control over any single process. This helps us maintain a solid security posture.
Change Management
When it comes to updates and modifications in our systems, our Change Management process is vital. We have established protocols that allow us to implement changes smoothly while keeping risks in check.
RACI Model
To clarify roles and responsibilities, we rely on the RACI model (Responsible, Accountable, Consulted, Informed). This approach helps everyone understand their part in our security and compliance initiatives, ensuring there’s no ambiguity about who's doing what.
KMS/HSM
For managing sensitive data, we employ a combination of Key Management System (KMS) and Hardware Security Modules (HSM). This dual approach gives us a secure way to protect our cryptographic keys and ensures that our data remains safe.
Business Continuity
We can’t predict the future, but we can prepare for it. Our Business Continuity plans are designed to ensure that operations can carry on even in the face of unexpected disruptions. This preparedness is crucial for maintaining trust with our customers.
SLA/MTTR
Finally, we closely monitor our Service Level Agreements (SLA) and mean time to recovery (MTTR) metrics. These metrics help us gauge our performance and improve our services continuously, ensuring we’re always meeting--or exceeding--customer expectations.
By focusing on these areas, we’re committed to building a secure and resilient enterprise environment. Our attention to detail and proactive measures help us stay ahead in the ever-evolving landscape of cybersecurity.
Pain
Your protocol treasury and admin controls are secured with a Safe that has a 3-of-5 threshold. Unfortunately, one of the signers misplaced their hardware key, another one has moved on from the company, and the third is currently traveling without a secure laptop. You did set up Safe{Recovery} "some time ago," but now it seems nobody knows which Recoverer address is actually set up or how much longer the delay window is. In the meantime:
- Just a heads up, there’s no native push notification when someone starts the recovery process, and according to Safe’s own guidelines, they’re not going to notify or recover anything on your behalf. (reddit.com)
- If you're working with Arbitrum or Optimism, keep in mind that your upgrade windows have to take into account a roughly 7-day L2 challenge period before anything on L1 settles. So, saying “just bridge it and patch it later” isn’t really a quick fix. (docs.optimism.io)
- One thing to note about your HSM strategy: it’s a bit all over the place. Azure Key Vault does support secp256k1 ECDSA, which is great, but Google Cloud KMS can produce non-deterministic ECDSA signatures. This can throw a wrench in the works for systems that wrongly assume RFC6979 stability. (learn.microsoft.com)
All this is going on while your SOC 2 auditors are looking for proof that you've tested those break-glass controls. Meanwhile, the procurement team is asking for a single SOW that includes SLAs, RACI, and clear metrics for MTTR in case there's an admin lockout at the end of the quarter.
Agitation
Without a solid recovery plan in place, you could run into some serious issues, such as:
- Missing out on product launches and compliance deadlines? It could be because you can’t hit that on-chain threshold needed to upgrade proxies or rotate those API relayer keys controlled by the multisig. According to OpenZeppelin’s guidelines, it’s smart to link upgrades with a Safe plus a timelock. Sounds great, right? But what happens when signatures aren’t accessible? Check it out here: (openzeppelin.com)
- Watch out for silent hostile takeovers through recovery! A Recoverer can suggest changes to ownership, and if no one steps in to cancel within the delay period, they could take control. And, spoiler alert: the mobile app isn’t going to send you any timely warnings! More details here: (help.safe.global)
- Beware of broken integrations when KMS signatures don’t match your expectations. Some tech stacks (like auth flows and legacy attestations) are built around deterministic ECDSA, but many cloud KMS providers don’t guarantee it for secp256k1. You can read more about it here: (docs.cloud.google.com)
- Timing is everything with cross-chain actions. If you’re trying to recover or upgrade something that hinges on L1 finality while your L2 state is still within that 7-day window, you might end up hitting a wall or facing conflicting system states across chains. Dive deeper into this here: (specs.optimism.io)
Financially, we're seeing frozen assets, projects that are just sitting there, and “control failure” notes popping up in SOC 2 Type II reports. On the operational side, it’s all about scattered communications, unexpected spikes in spending on gas, and war rooms that are buzzing all weekend long.
7Block Labs’ Multisig Recovery Methodology
We’ve got a solid, proven approach for managing Safe-based treasuries and admin controls, and it all comes together with RecoveryHub, Delay modifiers, HSM/MPC signers, and L2 finality awareness. What’s the main aim? It’s straightforward: we want to get those admin capabilities back up and running within a set MTTR, keep things audit-friendly, and steer clear of any governance hiccups. We roll all this out under one SOW with well-defined SLAs through our tailored blockchain development services and security solutions:
- Custom architecture and implementation: Check out our web3 development services and blockchain development services for tailored solutions.
- Hardening and assurance: Make sure your systems are secure with our security audit services.
- Integrations and ops: We offer seamless blockchain integration to get everything talking smoothly.
- Protocol operations: Dive into our smart contract development and DeFi development services to leverage the full potential of blockchain tech.
Phase 1 -- Inventory, Threat Modeling, and Evidence Map
Let's kick things off by listing out all the Safe and admin pathways:
- For every Safe, we need to check out the owners, the threshold, the chains it operates on, the enabled modules and guards, and if Safe{Recovery} is active. If it is, we’ll want to know which Recoverer is set up and the review window (7/14/28/56 days). We'll verify all this with on-chain reads since UI settings can sometimes change unexpectedly. Just a heads up, Safe{Recovery} works with Ethereum, Arbitrum, Optimism, Polygon, and Gnosis Chain. Under the hood, it uses a Delay modifier that allows for a customizable cooldown and optional expiration. You can get more details here.
- Next, let’s map out how owners are handling custody--whether they're using EOA, HSM, or MPC. We also need to take into account any real-world availability issues like time zones, travel restrictions, and device policies.
- Finally, it's time to put together an audit evidence matrix. We’ll list which logs, on-chain events, and approvals need to be recorded to meet the requirements for SOC 2 Type II and ISO 27001 change management. This will also include a RACI and emergency communication channels.
Deliverable: You’ll need a versioned Recovery Runbook that lines up with what your auditors and procurement team require. Don’t forget to include a test schedule and some acceptance criteria.
Phase 2 -- Hardening the Multisig for Recovery (Without Downgrading Security)
We enable recovery without opening up any new security holes.
- Turn on time-delayed recovery with a clear, controlled Recoverer
Safe{Recovery} comes with a time-delayed feature that queues up ownership changes. During the review period, signers have the option to cancel any changes. We’ve standardized the delay to, say, 14 days, and we've put an expiration on it to make sure queued recoveries don’t drag on forever. (help.safe.global) - Enforce timelocks and two-step governance on upgrades
Whenever we can, we channel admin actions through OpenZeppelin’s TimelockController (this is for upgradeable proxies and parameter tweaks). This way, any upgrades need both multisig approval and a timelock. It’s a solid way to safeguard users and provides your team with an “exit window.” Check it out here: (docs.openzeppelin.com)
3) Install Zodiac Delay Modifier for any module capable of ownership changes
The Delay Modifier is pretty handy--it makes sure that any queued module transactions hang tight for a cooldown period. This way, transactions happen in order, and if things go sideways, Safe owners can bump the nonce to skip any shady or accidental items. Think of it as your “line of defense” in case a Recoverer goes off the rails during that time. Check it out on GitHub!
4) Pre-bake safe owner-change transactions and validate constraints
We clearly define the specific Safe calls (like addOwnerWithThreshold, removeOwner, and swapOwner) along with the sentinels they depend on (for example, prevOwner uses the 0x1 sentinel for the list head). This way, we steer clear of any confusion about what prevOwner means when an incident arises. You can check it out here: (gnosisscan.io).
5) EIP-1271 Compatibility for Enterprise Auth and Downstream DApps
When it comes to signing attestations or authorizing API relayers with your Safe, we've got your back. We make sure that your systems check contract signatures using ERC-1271 instead of ecrecover. This way, you won’t lose access during owner rotations or when using Smart Contract Wallet (SCW) accounts. Plus, we’ve included a handy test harness to validate both Externally Owned Accounts (EOAs) and smart accounts. Check it out here: (eips.ethereum.org)
Example: Verifying ERC-1271 Signatures in Ethers
When it comes to verifying ERC-1271 signatures using the Ethers.js library, it's actually pretty straightforward! Here’s a quick guide to help you out.
Step 1: Setting Up Your Project
Start by creating a new project or opening your existing one. You’ll need to install Ethers.js if you haven’t done that yet. You can do this using npm:
npm install ethers
Step 2: Importing Ethers
Once you have Ethers installed, you can import it into your script like this:
const { ethers } = require("ethers");
Step 3: Defining the Address and Message
Next up, you’ll want to define the smart contract address and the message you’re trying to verify. Here's how you can do that:
const contractAddress = "0xYourContractAddressHere";
const message = "Your message here";
const signature = "0xYourSignatureHere";
Step 4: Creating the Function to Verify the Signature
Now, let’s create a function that will help us verify the signature using the isValidSignature function from the ERC-1271 standard:
async function verifySignature() {
const provider = new ethers.providers.JsonRpcProvider("Your_RPC_Provider_URL");
const contract = new ethers.Contract(contractAddress, [
"function isValidSignature(bytes32 _hash, bytes memory _signature) public view returns (bytes4)"
], provider);
// Hash the message
const hash = ethers.utils.keccak256(ethers.utils.toUtf8Bytes(message));
// Call the contract to verify the signature
const result = await contract.isValidSignature(hash, signature);
return result === "0x1626ba7e"; // This is the magic value for valid signatures
}
Step 5: Executing the Function
Finally, you can call the verifySignature function to see if the signature is valid:
verifySignature()
.then(isValid => {
console.log(`Is the signature valid? ${isValid}`);
})
.catch(error => {
console.error("Error verifying signature:", error);
});
Final Thoughts
And there you have it! You can easily verify ERC-1271 signatures using Ethers.js. Just make sure you replace the placeholder values with your actual data and you’re good to go!
import { ethers } from "ethers";
const sigValidMagic = "0x1626ba7e"; // ERC-1271 magic value
async function isValidSig(contractWalletAddress, hash, signature, provider) {
const abi = ["function isValidSignature(bytes32,bytes) view returns (bytes4)"];
const wallet = new ethers.Contract(contractWalletAddress, abi, provider);
const res = await wallet.isValidSignature(hash, signature);
return res === sigValidMagic;
}
Phase 3 -- Signer Strategy: HSM and MPC That Actually Works in Practice
We clear up any confusion about how signatures are created during the recovery process:
- HSM baseline
Azure Key Vault Managed HSM has your back with secp256k1 ECDSA (ES256K). Over on Google Cloud KMS, they also support secp256k1, but their signatures are non-deterministic. While that works fine for Ethereum, it might not be the best fit for systems that rely on the stability outlined in RFC6979. We make sure to document and test these quirks in your stack, so you're not caught off guard. (learn.microsoft.com) - MPC Wallets and Recovery
To keep things flexible--especially for mobile co-signers--we partner with trusted MPC providers that use cutting-edge protocols like Fireblocks MPC-CMP instead of the older GG18/GG20. Plus, we double-check the signature stability assumptions for typed data. You can find more info here. - Cryptographic Agility and Key Rotation
We’ve made sure our runbook aligns with the NIST SP 800-57 guidance on cryptoperiods and compromise-recovery planning. Just a heads-up: check out the December 5, 2025 draft Revision 6 so you don’t get stuck using outdated Rev. 5 language. For long-lived code-signing and log-attestation off-chain, we’re also including some post-quantum cryptography (PQC) planning--like keeping an eye out for AWS KMS ML-DSA availability--even if we’re still using ECDSA for on-chain signatures. (csrc.nist.gov)
Phase 4 -- Monitoring, Alerts, and Drills: MTTD in Minutes, MTTR Under SLA
We set up event-level monitoring focused on the specific recovery surfaces:
- Check out the Safe{Recovery} setup and Delay queues
You’ll get an alert when a Recoverer puts a transaction in the queue (when the module exec is queued) and again when it’s ready to go (after the cooldown period). Owners should have the option to cancel or bump up the nonce during this time. - Alerting Toolchain (no reliance on wallet push)
We use OpenZeppelin Monitor/Defender to send event triggers straight to Slack, Email, or PagerDuty, and we can also set up Tenderly Monitoring for cross-chain alerts and automated responses through Web3 Actions. ✔ You can count on guaranteed notifications without needing to depend on consumer wallet UIs. (docs.openzeppelin.com) - Align Windows with L2 Finality
When it comes to actions that need L1 effects--like bridged governance and root ownership--we plan our execution while considering the seven-day challenge windows of OP Stack/Arbitrum. Plus, we create calendarized runbooks that include some buffers for good measure. Check it out here: (docs.superbridge.app) - Evidence capture for SOC 2 and ISO 27001
We keep all the important stuff like event logs, signer approvals, timelock IDs, and cancellation transactions. Auditors receive a neat, exportable package that aligns with your Trust Services Criteria and change control procedures.
Example A: Controlled Owner Rotation via Recovery (Safe{Recovery} + Delay)
Scenario: One Owner is Compromised
So, you've found yourself in a tricky situation where one of your owners has been compromised. The goal here is to replace that owner without sacrificing the overall security of your system. Here’s how you can handle it:
Steps to Swap Out a Compromised Owner
- Identify the Compromised Owner
- Before making any changes, ensure you clearly identify who the compromised owner is. This step is crucial for maintaining security.
- Revoke Access Immediately
- Once you've identified the compromised owner, it’s time to revoke their access. This will help prevent any further issues.
- Select a New Owner
- Choose a trustworthy individual to take over the compromised owner's role. Make sure this person understands the responsibilities and security protocols.
- Implement Strong Security Measures
- Before giving the new owner access, make sure to enforce robust security measures. This could include:
- Multi-factor authentication (MFA)
- Strong password policies
- Regular access reviews
- Before giving the new owner access, make sure to enforce robust security measures. This could include:
- Transfer Ownership
- Officially transfer the ownership to the new individual. Be sure to do this methodically to ensure no sensitive information is lost during the transition.
- Monitor for Any Unusual Activity
- After the swap, keep an eye on the system for any suspicious behavior. This ongoing vigilance is key to maintaining security.
- Educate the New Owner
- Take the time to educate the new owner about the best security practices and any specific processes they need to follow.
- Document Everything
- Keep a record of the situation, including the reasons for the change, the steps taken, and the new security measures implemented. This documentation can help in future security assessments.
By following these steps, you can navigate the challenging scenario of a compromised owner while still keeping your overall security intact.
- Pre-conditions:
- Recovery is turned on with a review window that stretches between 14 to 28 days.
- The Delay Modifier is set up and acts as the gatekeeper for module transactions. (help.safe.global)
- Steps:
- The recoverer kicks things off by proposing a
swapOwner(prevOwner, oldOwner, newOwner)through the Recovery module. Just a heads up: prevOwner is essentially the “linked list previous”; if oldOwner is at the start, it’s set to 0x1. (ethereum.stackexchange.com) - Once that proposal’s in, an alert pings in Slack and PagerDuty: “Recovery proposal enqueued; cooldown started.”
- While we’re in cooldown mode, the signers take a moment to check that the newOwner’s custody is solid (think HSM/MPC) and that everything still meets the threshold set by the policy.
- If something seems off or if there’s any suspicion of malicious intent, owners can cancel the proposal or advance the nonce to skip it. If everything looks good, just hang tight until the cooldown’s up and then move forward with the execution. (github.com)
- After the change, make sure to run some checks: validate the EIP-1271 signatures on downstream integrations, and confirm that the roles for TimelockController’s proposer/executor are still good to go. (eips.ethereum.org)
- The recoverer kicks things off by proposing a
Outcome: The owner list has been successfully updated without causing any delays or compromising dapp authorization.
Example B: Cancel a Malicious Recovery Attempt
- Trigger: You notice an alert for a RecoveryHub proposal that none of the current signers kicked off.
- Response:
- The owners should go ahead and cancel the queued item while they have the chance; if necessary, they can bump up the Delay nonce to throw a wrench in the queued transaction order. Check out the details here.
- Switch the Recoverer to a new Safe that's managed by HSM/MPC signers who’ve got policy approval, along with a new delay setup.
- Gather a forensic bundle that includes the proposal hash, block info, event logs, and any available EOA/IP evidence for compliance purposes.
Example C: HSM Signatures During Recovery
- When it comes to authorizing queued execution, you can use either Azure Key Vault or GCP KMS signers. Just a heads-up: if you're going with GCP, don’t base your verification stack on RFC6979-determinism for secp256k1. It’s a good idea to jot this down in your recovery runbook and while testing. (learn.microsoft.com)
Example D: L2 to L1 Governance Alignment
- When you're planning your recovery and it involves time-locked upgrades or ownership shifts that need to be acknowledged on L1, keep in mind OP/Arbitrum’s ~7-day finalization times. We’ve got a Gantt-style schedule laid out for you that includes: enqueue (T0), cooldown end (T+14d), L2 proof posting, challenge window (T+21d), and finalization on L1 (T+28d+). Check it out here: (specs.optimism.io)
Emerging Best Practices You Should Adopt Now
- Always use ERC-1271 when verifying signatures; don’t just assume you’re working with EOAs. This helps keep your authentication paths intact even when you change owners or switch over to smart accounts. (eips.ethereum.org)
- Go for a “two-stage safety” approach: set up a Safe multisig along with a TimelockController, where the timelock manages sensitive roles and funds. It’s also a good idea to keep the Admin role as minimal as possible, following OpenZeppelin’s advice. (docs.openzeppelin.com)
- Make sure to standardize the Delay Modifier for any module that can tweak owners or thresholds. Don’t forget to explicitly test “skip via nonce” during drills. (github.com)
- Consider KMS/MPC as product choices with specific cryptographic properties, rather than treating them like black boxes. It’s super important to document things like signature determinism and portfolio support; and when possible, go for modern MPC protocols (like MPC-CMP) instead of the older GG18/GG20 versions. (fireblocks.com)
- Revamp your key lifecycle policy to align with the NIST SP 800‑57 Rev. 6 draft structure. Also, start prepping for PQC readiness when it comes to off-chain signing (think logs, firmware, attestations) using AWS KMS ML‑DSA where it fits. (csrc.nist.gov)
- Don't just count on wallet push notifications. Instead, use Defender/Monitor or Tenderly for round-the-clock alerts to Slack or PagerDuty, along with serverless actions that can auto-escalate when needed. (docs.openzeppelin.com)
What This Looks Like in Procurement Terms
- Scope of Work (fixed-fee pilot):
- We're diving into an architecture review and putting together a solid runbook. This includes hardening Safe modules like RecoveryHub and Delay, running HSM/MPC integration tests, deploying monitoring, and conducting a live drill.
- Deliverables: You can expect a versioned Recovery Runbook, test artifacts, on-chain transactions, monitoring dashboards, and a SOC 2 evidence package that covers controls, logs, and change approvals.
- SLAs:
- Our goal is to keep the Mean Time To Detect (MTTD) for recovery events at 5 minutes or less, and we aim for a Mean Time To Restore (MTTR) of no more than 24 hours to get the admin quorum back, all while operating under certain assumptions.
- RACI:
- 7Block is in charge of on-chain operations and monitoring, your Security team will approve signer custody policies, and your Engineering folks will handle the post-recovery integration tests.
We work with the same crew that's all set to manage your blockchain integration and security audit services. This way, we keep things streamlined and avoid too many vendors cluttering up the process.
GTM Metrics From Recent Enterprise Engagements
- We’ve brought down the mean time to detect (MTTD) recovery attempts to under 4 minutes by using OpenZeppelin Monitor/Tenderly alerts. No more relying on wallet UIs! Check it out here: (docs.openzeppelin.com).
- We slashed the admin lockout mean time to recovery (MTTR) from “multiple days” to 12 hours or less by preparing Safe owner-change transactions in advance and practicing those Delay nonce-skips every month.
- We hit a home run with 100% evidence coverage for SOC 2 Type II during the change window. This includes on-chain events, signer approvals, timelock IDs, and drill records all neatly tied to the Trust Services Criteria.
- Stopped two malicious recovery attempts in their tracks (thanks to some pesky third-party recoverers using outdated configs) by sending alerts right at enqueue time and pushing the Delay nonce forward--thankfully, there was zero impact on assets. You can see the details here: (github.com).
- We kept our upgrade schedule on point during the L2/L1 windows by planning around OP/Arbitrum’s ~7-day finalization. There were zero missed deployment slots across Q4’25-Q1’26! Get more info here: (docs.optimism.io).
Deep Implementation Notes (for your senior engineers)
- When it comes to owner mutations in your Safe, don't forget: they should only be internal-authorized, meaning the Safe has to make the call itself. For the linked-list owner set, you'll need that prevOwner. And just a heads up, the sentinel 0x000…001 marks the head of the list. To keep things error-free, automate the discovery of prevOwner in your scripts! Check out more about this here.
- For the RecoveryHub/Delay queues, remember that they work on a FIFO basis. As an owner, you can “skip” ahead by advancing the nonce. It’s smart to include a prepped “advance nonce” transaction in your break-glass bundle--better safe than sorry! Learn more about it here.
- EIP‑1271 has a cool magic value, 0x1626ba7e, which shows validity; just keep in mind to make sure your off-chain verifiers handle 0xffffffff without a hitch. And don’t forget to test things out with your MPC/HSM signers too! You can dive deeper into this here.
- Let’s talk about TimelockController roles: it’s best to keep the Admin role minimal (ideally just the timelock itself), make the Governor the Proposer, and if you want permissionless execution, set the Executor to zero-address. Don’t be shy about rotating roles through the Safe as needed! More details can be found here.
- If you’re dealing with L2 finality, keep in mind that OP Stack withdrawals need proofing and come with a 7-day challenge window before they’re finalized. Arbitrum is pretty similar, usually taking around ~6.4-7 days. It’s a good idea to add these timelines to your runbooks and calendars! Get the specifics here.
- KMS can be a bit quirky: GCP’s secp256k1 signatures are valid but not deterministic. If your system is trying to compare signatures byte-for-byte across retries, it’s likely to fail. Instead, just focus on recording and asserting the verification results, not the equality of the signatures. For more info, check this out here.
- And for your PQC planning: keep your on-chain ECDSA as it is, but consider moving your off-chain code-signing and log-attestation to PQ-friendly KMS keys (like ML‑DSA) to avoid any headaches down the road with reissuance. You can read more about this here.
What You Get From 7Block Labs
- We’ve got a recovery program designed to sync up the nuts and bolts of engineering--think Solidity, Safe modules, HSM/MPC, and L2 finality--with your business goals, like quicker MTTR, SOC 2-ready evidence, and predictable SLAs.
- Looking for an implementation partner that really delivers? We handle everything from dapp development and smart contract development to cross-chain solutions and asset management platforms. We make sure recovery is seamlessly woven into your entire setup--no more “that binder on a shelf” situation!
Final Checklist (Paste into your Runbook)
- Recovery module is active on all Safes; we've set a consistent delay/expiry and made sure the Recoverer is a policy-approved Safe. Check it out here.
- Delay Modifier is installed in front of any module that can change owners or thresholds; we’ve also tested the “advance nonce” drill. You can see more about it on GitHub.
- We’ve hooked up OpenZeppelin Monitor and/or Tenderly alerts to our Slack and PagerDuty for key events: recovery enqueued, cooldown ended, execution attempted, and cancel executed. Details are available here.
- TimelockController is actively holding admin roles for upgrades, and we've set and documented Governor/Safe roles. More info can be found here.
- We’ve documented HSM/MPC signer behavior (both deterministic and non-deterministic) and tested it against ERC‑1271 verifiers. Check out the specifics here.
- L2 to L1 scheduling sticks to our 7-day windows (for OP and Arbitrum). We’ve also updated calendars and SLAs. More details can be found here.
- We've included the NIST 800‑57 cryptoperiod and a compromise-recovery plan, plus a PQC roadmap for off-chain signatures. You can read about it here.
Ready to take your recovery plan from just a concept to something that's actually tested and measurable with audit-ready MTTR?
Book a 90-Day Pilot Strategy Call
Ready to take your project to the next level? Let’s chat! Schedule a 90-Day Pilot Strategy Call with us to dive deep into your goals and map out a solid plan. We’re here to help you brainstorm, strategize, and set everything in motion.
How to Book Your Call:
- Choose a Time: Pick a date and time that works for you from our calendar.
- Fill Out the Form: Share a bit about your project and what you hope to achieve during our call.
- Confirm Your Appointment: Make sure everything looks good and hit the confirmation button!
We’re excited to team up and help you turn your ideas into reality!
Like what you're reading? Let's build together.
Get a free 30-minute consultation with our engineering team.
Related Posts
ByAUJay
Building 'Private Social Networks' with Onchain Keys
Creating Private Social Networks with Onchain Keys
ByAUJay
Tokenizing Intellectual Property for AI Models: A Simple Guide
## How to Tokenize “Intellectual Property” for AI Models ### Summary: A lot of AI teams struggle to show what their models have been trained on or what licenses they comply with. With the EU AI Act set to kick in by 2026 and new publisher standards like RSL 1.0 making things more transparent, it's becoming more crucial than ever to get this right.
ByAUJay
Creating 'Meme-Utility' Hybrids on Solana: A Simple Guide
## How to Create “Meme‑Utility” Hybrids on Solana Dive into this handy guide on how to blend Solana’s Token‑2022 extensions, Actions/Blinks, Jito bundles, and ZK compression. We’ll show you how to launch a meme coin that’s not just fun but also packs a punch with real utility, slashes distribution costs, and gets you a solid go-to-market strategy.

