Signatory v1.3.1: Tallinn Protocol Ready, Enhanced Policy Controls, Enterprise Hardening

We’re excited to announce Signatory v1.3.1, now available as a release candidate. This release brings Tallinn protocol support, new policy controls for tighter operational security, and continued improvements for enterprise and institutional operators.

Tallinn Protocol Support

Signatory v1.3.1 is ready for the upcoming Tallinn protocol upgrade. Thanks to gotez v2.3.19, all protocol interfaces and operation types are updated—no configuration changes required for existing deployments.

New Policy Controls

This release introduces two powerful new policy options for operators who need fine-grained control:

  • allowed_chains: Restrict signing to specific Tezos chain IDs. Prevent mainnet keys from ever signing testnet operations (or vice versa)—a common compliance requirement for institutional custody
  • allow_proof_of_possession: Explicitly control BLS proof-of-possession signing for tz4 keys, with PoP status now visible in key listings

Stricter Request Validation

Signatory now performs stricter validation of sign requests and operation kinds. Invalid or unrecognized operations are rejected with clear error messages, providing better security boundaries and faster debugging when clients are misconfigured.

Signature Canonization

Implemented low-S normalization for ECDSA signatures across Azure and AWS KMS vaults. This ensures signature malleability protection and consistent signature formats—important for interoperability and security auditing.

Security Updates

  • Upgraded JWT authentication library to v5, addressing CVE-2024-51744
  • Fixed a credential rotation bug where authentication could fail during key rotation windows

What’s Next

We’re continuing to build Signatory for enterprise and institutional operators:

  • Enhanced Observability: Better metrics and structured logging for monitoring integration
  • CloudHSM Backend for Nitro Enclave: AWS CloudHSM support for FIPS 140-2 Level 3 certified key storage (#724)
  • Audit Readiness: Signatory is already built with auditability in mind—we’re adding improved audit logging and documentation for SOC 2 control mapping

Coming Soon: Signatory-EVM for Etherlink

We’re developing Signatory-EVM—bringing Signatory’s secure key management to Etherlink execution layer signing. This enables unified key management across Tezos X ledgers and runtimes, allowing operators to manage L1 baking keys and Etherlink EVM keys through a single, auditable signing infrastructure.

Use cases include:

  • DeFi & Application Backends: Secure signing for smart contract interactions and automated operations
  • Oracle Operators: HSM-backed key management for price feeds and data attestations
  • Bridge Operators: Secure custody of bridge signing keys with policy controls
  • Institutional Custody: Unified key management for Tezos and Etherlink assets

Interested in early access? Contact us at frontdesk@ecadlabs.com.

Upgrade Checklist

  • Review release notes for full changelog
  • Test in your staging environment (this is an RC release)
  • Consider enabling allowed_chains if you operate across multiple networks
  • Review allow_proof_of_possession settings for tz4 keys

Resources

Important Notes

  • This is a release candidate—please test thoroughly before production deployment
  • No breaking changes; existing configurations continue to work
  • Tallinn protocol support is ready for when the upgrade activates

Signatory development is partly funded by the Tezos Foundation.

Questions or feedback? Reach us at support@ecadlabs.com or open an issue on GitHub.

3 Likes

v1.3.1 is now officially released. No changes from the RC. Full release notes here: Release v1.3.1 Ready for Tallinn 🇪🇪 · ecadlabs/signatory · GitHub

Thanks to everyone who tested!

2 Likes