Bypass-resistant controls
UI-only allowlists are brittle. RegVault blocks bad transfers with protocol-enforced checks on the asset path itself.
RegVault is an institutional permissioned vault-share system for Solana. It combines Token-2022 enforcement, role-aware operations, and audit-grade evidence so controls survive beyond a single interface.
Why it matters
UI-only allowlists are brittle. RegVault blocks bad transfers with protocol-enforced checks on the asset path itself.
Wallets map back to regulated entities, attestations expire, and execution proofs remain discoverable after the workflow completes.
Control Surface
Token-2022 + Transfer Hook
Workflow
Registry, approvals, receipts
Operator View
Live dashboard + demo evidence
Each component operates independently on-chain. Compliance enforcement lives in the token, not the interface—so controls hold regardless of which front-end, program, or wallet initiates a transfer.
Compliance policy is wired into the share mint via Token-2022 Transfer Hook. Every transfer validates entity status, active attestation, and destination approval before settling. No UI bypass is possible.
Institutional wallets are bound on-chain to regulated entities with issuer-signed attestations. Attestation expiry, KYC status, and sanctions flags gate investor actions automatically.
Withdrawal requests enter a bitmap-based dual-approval queue. Operator and compliance roles each hold one approval bit, with a configurable timelock enforced before execution.
Every executed withdrawal writes a receipt PDA to chain—request ID, entity, destination, amount, and policy snapshot. Permanent, tamper-proof, and queryable via the open API.
Every entity carries a risk tier, sanctions status, and KYC expiry. Velocity limits are enforced per entity per day. Transfers above the FATF threshold collect and hash counterparty data before the transaction proceeds.
Entity Risk Tiers
LOW · MEDIUM · HIGH with configurable daily withdrawal caps per tier
Sanctions Screening
Chainalysis, Elliptic, or TRM Labs — CLEARED / FLAGGED / PENDING status
KYC / KYB
Sumsub, Onfido — expiry-tracked with automatic access gates on lapse
FATF Travel Rule
Originator and beneficiary data hashed and submitted at the $1,000 threshold
Velocity Monitoring
Daily caps per risk tier with WATCH / ALERT / CRITICAL escalation alerts
Access control is enforced at the program instruction level. Each wallet is classified against the vault's role registry before any instruction executes.
Admin
Full protocol configuration, role assignment, and emergency controls
Compliance
Entity management, attestation issuance, and withdrawal approval authority
Operator
Withdrawal queue approval and post-timelock execution
Emergency
Pause-only authority for circuit-breaker scenarios
Investor
Deposit and withdrawal when entity is active and fully attested
Registry binds entities, wallets, and issuer attestations on-chain.
Vault controls queue, approvals, timelocks, and execution state.
Transfer-hook policy validates destination rules at transfer time.
Receipt PDAs turn execution into permanent audit evidence.
Hook wiring health and ExtraAccountMetaList validation
Role-aware operations status with read-only fallback
Withdrawal Queue rows with approvals and unlock windows
Immutable Receipts feed and operator failure simulations
Mission Control Snapshot
Hook Health
Healthy
Queue State
2 pending
Receipts
Audit ready
Wallet Mode
Role aware
RegVault provides the on-chain infrastructure for institutions operating under regulatory obligations. Deploy on any Solana cluster—compliance enforcement runs at the protocol layer, not the operator layer.