
Security News
Nx npm Packages Compromised in Supply Chain Attack Weaponizing AI CLI Tools
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.
blockstack-keychain
Advanced tools
Library for creating elliptic curve keypairs and deriving child keys
A library for effective private and public keychain management.
This library provides a powerful key derivation interface that is based on the creation of private and public keychains.
A private keychain contains a private key, and has a corresponding public keychain that can be derived from it.
Child keychains can be derived in 6 different ways:
Method 1 can be used to create private subaccounts, as long as the creator keeps a recording of the entropy used to derive each subaccount.
Method 2 can be used to enumerate private subaccounts, without the requirement of recording any information beyond the information stored in the master keychain (this is the equivalent of BIP32 hardened keys).
Method 3 can be used to create private subaccounts that can be accessed/re-derived by name.
Method 4 can be used to create children that are not known to be linked to the parent until the entropy for each key is revealed.
Method 5 can be used to enumerate a bunch of children and be certain that everyone with the same public keychain is enumerating the same keys without having to share additional information (this is the equivalent of BIP32 unhardened keys).
Method 6 can be used to create a bunch of children that can be accessed/re-derived by name.
$ npm install blockstack-keychain
import { PrivateKeychain, PublicKeychain, getChildKeypair, getEntropy } from 'blockstack-keychain'
var blockstackKeychain = require('blockstack-keychain')
var PrivateKeychain = blockstackKeychain.PrivateKeychain,
PublicKeychain = blockstackKeychain.PublicKeychain,
getEntropy = blockstackKeychain.getEntropy,
getChildKeypair = blockstackKeychain.getChildKeypair
var privateKeychain = new PrivateKeychain()
var publicKeychain = privateKeychain.publicKeychain()
var publicKeyString = '023db6b4e3cb22097a9b6b9c82ff6becb8cb01561fd46c3484abf22ff4dc30ee58'
var publicKeychain2 = new PublicKeychain(publicKeyString)
var entropy = getEntropy(32)
var privateChildKeychain = privateKeychain.child(entropy)
var publicChildKeychain = publicKeychain.child(entropy)
var publicChildKeychain2 = privateChildKeychain.publicKeychain()
Note that the independently derived public child keychains should be equal
> var publicKey1 = publicChildKeychain.publicKey('hex')
> var publicKey2 = publicChildKeychain2.publicKey('hex')
> console.log(publicKey1 === publicKey2)
true
var firstPrivateChildKeychain = privateKeychain.privatelyEnumeratedChild(0)
var firstPublicChildKeychain = publicKeychain.publiclyEnumeratedChild(0)
Note that the privately-enumerated child should not correspond to the publicly-enumerated child
> var publicKey1 = firstPrivateChildKeychain.publicKeychain().publicKey('hex')
> var publicKey2 = firstPublicChildKeychain.publicKey('hex')
> console.log(publicKey1 === publicKey2)
false
var namedPrivateChildKeychain = privateKeychain.privatelyNamedChild('home-laptop-1')
var namedPublicChildKeychain = publicKeychain.publiclyNamedChild('home-laptop-1')
Note that the privately-named child should not correspond to the publicly-named child
> var publicKey1 = namedPrivateChildKeychain.publicKeychain().publicKey('hex')
> var publicKey2 = namedPublicChildKeychain.publicKey('hex')
> console.log(publicKey1 === publicKey2)
false
FAQs
Library for creating elliptic curve keypairs and deriving child keys
We found that blockstack-keychain demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.
Security News
CISA’s 2025 draft SBOM guidance adds new fields like hashes, licenses, and tool metadata to make software inventories more actionable.
Security News
A clarification on our recent research investigating 60 malicious Ruby gems.