New: Explore our latest Web3 innovations.Learn More

Build embedded wallet infrastructure for real users with account abstraction, MPC security, gas sponsorship, recovery workflows, and policy controls designed for production scale.
The Problem
Teams rarely ask for embedded wallets directly. They need solutions for onboarding, transaction UX, key risk, and enterprise control.
Onboarding drop off caused by seed phrases, extensions, and unclear recovery
Gas friction blocking first transactions and reducing conversion
Repetitive signatures degrading UX in high frequency flows
Enterprise workflows needing multi approval and enforceable policy controls
Wallet as a Service enables programmable smart accounts, distributed signing, and policy enforcement so wallets become invisible to users while remaining non custodial and auditable.

Smart accounts turn wallets into programmable application accounts instead of static key pairs. Ancilar builds ERC 4337 based smart wallet architecture with gas abstraction and enforceable policy controls. Typical use cases include paymaster configuration for sponsored transactions, bundler orchestration and batching, spend limits and allowlists, session keys with scoped permissions, and time bound rules for transaction execution.

For seedless security and enterprise grade controls, Ancilar implements MPC wallet infrastructure using threshold signature schemes. No single device or server can independently sign transactions. Typical use cases include key share distribution architecture, server side policy validation layers, recovery share orchestration, key rotation governance, and lifecycle management aligned with operational and compliance requirements.

A WaaS platform must not become custodial by accident. Ancilar designs non custodial embedded wallet systems where cryptographic control is distributed while UX remains seamless. Typical use cases include guardian based recovery models, role based access control for teams, transaction simulation before execution, audit friendly logging, operational monitoring, and documented custody boundaries.
Our Process
Successful WaaS implementations follow a structured lifecycle.
Skipping architecture clarity early creates long term operational risk.
Evaluate MPC, device based storage, or hybrid models and define custody boundaries, recovery assumptions, and threat models.
Define spend limits, guardian flows, gas sponsorship rules, session scopes, and transaction constraints upfront.
Implement SDK layers, authentication flows, wallet creation, signing pipelines, and recovery logic embedded directly into product UX.
Simulate device loss, phishing, replay attempts, rate limit abuse, guardian failure, and policy misuse scenarios.
Define upgrade paths, graduation to hardware wallets, and long-term maintenance ownership without losing account history or permissions.
Security First
Wallet as a Service must assume real world threats including lost devices, phishing, reused credentials, and insider risk.
Replay attacks, guardian failures, phishing simulation, policy abuse, and rate limit exhaustion tested before launch.
Spend limits, destination allowlists, time bound rules, transaction simulation, and emergency pause modules enforced at the wallet layer.
MPC and threshold signature schemes ensure no single party holds the full private key.
Guardian based recovery without seed phrases, structured key rotation, and audit friendly logs aligned with enterprise control frameworks.
Infrastructure aligns with custody risk models and compliance evaluation without centralizing control.
Ideal Clients
We see the strongest fit with:
If wallet infrastructure affects onboarding, transaction volume, or regulatory exposure, it must be treated as core infrastructure.
Why Ancilar
Most teams can integrate a wallet SDK. Fewer can design production-grade Wallet-as-a-Service development that survives enterprise review. Teams work with Ancilar because:
Custody boundaries defined before integration
Trade-offs are explained clearly, including what not to build at each stage
Security controls are implemented, limits, policies, recovery realism, and abuse protection
Embedded wallet development is designed for long-term maintainability with operational visibility at scale
The objective is durable wallet infrastructure, not temporary feature delivery.
Our Approach
Depending on project maturity, engagement typically includes:
Architecture validation and WaaS implementation planning
Embedded wallet development support within an existing engineering team
End to end Wallet as a Service delivery including smart accounts, MPC infrastructure, and launch readiness
We recommend the right architecture for your stage, even if that means starting smaller.
FAQs
For many day-to-day use cases, an MPC and passkey or secure-enclave approach can be safer than seed phrases because it reduces human error. Hardware wallets remain excellent for high-value cold storage. We will help you choose based on user risk and asset value.
Yes. Paymasters and gas abstraction allow transaction sponsorship within defined policy limits.
Guardian based models allow predefined parties or devices to approve recovery without seed phrases.
Signing authority remains cryptographically distributed and enforced by policy rather than held by a centralized provider.
EVM networks, Layer 2 rollups, appchains, and other compatible environments based on product requirements.
Yes. Export flows and migration paths can preserve account history and permissions.
Timelines vary by architecture and compliance requirements, but most teams begin with scoped architecture validation.
A focused discussion is usually enough to: