Choose your stack
Target CLN or LDK to match your architecture
The VLS SDK keeps keys off-node and validates every Lightning action before signing, the only solution that does both. If your node is compromised, your funds stay safe.
One breach can drain all funds. Keys stored on nodes create single points of failure.
Separates keys but signs any request. Still approves unsafe operations. Double the risk. Still custodial.
Custodial obligations can slow iteration and limit market entry.
Keys remain strictly off-node, can be secured on hardened devices and paired with customizable security policies.
Validate every operation before signing. Stay secure even if node is compromised.
Users retain control. Reduce custodial risk and regulatory overhead.
Choose your stack and follow three simple steps
Target CLN or LDK to match your architecture
Local test environment with signer connection
Get StartedConfirm policy checks run and unsafe requests are blocked
Policy ExamplesSee the difference in security and custody models
| Feature | Recommended VLS | Hot Wallet |
User Holds Keys
(aka Blind Signing)*
|
|---|---|---|---|
| Keys Off-Node | ✓ | ✕ | ✓ |
| Transaction Validation | ✓ | ✓ | ✕ |
| Policy Enforcement | ✓ | ✓ | ✕ |
| Non-Custodial | ✓ | Mix | ✕ |
| Safe if Node is Compromised | ✓ | ✕ | ✕ |
| Regulatory Compliance | Low Burden | High Burden | High Burden |
| Security | Enterprise Grade | Weak | Weakest |
* Regulatory exposure varies by jurisdiction; consult counsel. Blind signing: User holds keys but doesn't validate transactions, blindly approving all requests from the provider's node, including potential theft of funds. This is how many wallets marketed as “non‑custodial” operate today.
Whether you're securing your own funds or building for customers
Secure your Lightning funds with enterprise-grade security. Keep keys in a separate environment while maintaining full self-custody.
Build truly non-custodial Lightning wallets and services where only users can control their funds. Reduce your regulatory burden and increase user trust.
Recent VLS releases & improvements
Integrates lnrod into main workspace, adds BOLT12 signing support, improves monitoring, and upgrades dependencies for security and performance.
Release notesAdds SimplePolicy config, LDK phase-2 support, and key handling fixes.
Release notesIntroduces LSS support, trusted oracle validation, and HSMD v6.
Release notesVLS (Validating Lightning Signer) keeps Lightning private keys off the node and validates every request before signing. If a node is compromised or misbehaves, VLS refuses the signature. Result: non‑custodial control, hot‑wallet speed and enterprise-grade security.
Blind signing is when a signer produces signatures without validating what it signs. Separating keys from the node helps only if the signer enforces protocol and policy. Without validation, you get shared custody (the node can trick the signer)and two failure paths (node or signer).
Yes. Under the standard definition: only the user who holds keys with VLS can move funds. The node may propose updates, but the validating signer enforces policy and approves or rejects. A compromised node alone cannot move funds.
VLS ships reference integrations for CLN and LDK. LND and Eclair are not yet supported.
Validating signer with policy engine, vlsd daemon/Docker, UTXO oracle (txood), Lightning Storage Server, and CLN/LDK integrations. Licensed Apache‑2.0 and open for audit.
Fewer custody incidents and less custom security code frees up time to ship features. Non‑custodial options powered by VLS attract users who won't deposit funds in custodial solutions. See Greenlight's case study.
Join industry leaders who trust VLS to protect Lightning funds.