PalmeraFebruary 19, 202610 min read

Multisig Setup & Security Best Practices for On-Chain Teams

Multisig Setup & Security Best Practices for On-Chain Teams

Multisig wallets have become the operational backbone of on-chain organizations. Across the EVM ecosystem, Safe is the most widely adopted and battle-tested smart account standard, used to manage treasuries, contract ownership, and execution authority at scale.

A secure multisig is not just about deploying contracts. It is about signer architecture, threshold design, transaction discipline, recovery planning, and operational structure.

At Palmera, we deploy and operate multisig infrastructure compatible with Safe for EVM chains, run HyperSig in the Hyperliquid ecosystem, and support Foundations with treasury operations consulting through Stratum. Across these environments, one principle remains consistent: multisig security depends as much on configuration and process as it does on the underlying smart contracts.

This guide outlines practical best practices for setting up and operating a multisig in production environments, from Safe compatible multisigs to HyperSig and other blockchains with multisig wallets.

1. Design the Signer Structure Thoughtfully

Signer design is the foundation of any multisig creation. In practice, whether using Safe, HyperSig, or another implementation, a well-structured multisig should reflect real organizational boundaries, not convenience.

Each signer must be independently controlled. Keys should not be stored on the same device, within the same browser environment. For treasury-level control, a combination of hardware wallets and EOAs is common, with hardware wallets typically holding primary authority.

Signer roles should align with real responsibilities. Operational signers may differ from executive or oversight signers. A multisig is most effective when its structure mirrors how decisions are actually made within the foundation, protocol team, or treasury committee.

2. Select an Appropriate Threshold

Threshold configuration defines how authority is shared.

A production multisig should avoid thresholds that allow unilateral execution. At the same time, the configuration should tolerate the temporary loss or unavailability of one signer without halting operations.

There is no universal threshold model, but for many teams managing meaningful treasuries, 2-of-3 or 3-of-5 configurations offer a practical balance between resilience and coordination efficiency.

As the organization evolves, threshold design should be revisited. Multisig architecture is not static; it should mature alongside treasury size, team structure, and operational complexity.

3. Maintain Transaction Review Discipline

Multisigs enforce multi-party approval, but the quality of that approval remains a human responsibility.

Each signer should independently verify the recipient address, token amounts, and contract function being executed. Where available, transaction simulation tools should be used consistently, particularly for contract interactions.

High-value transfers, ownership changes, or module modifications warrant additional internal coordination before approvals are submitted.

Multisig distributes responsibility. Review discipline ensures that responsibility is exercised deliberately and consistently.

4. Protect Signer Keys Properly

Strong key management complements any multisig security model.

Hardware wallets should always be used as one or two of the signers managing treasury authority. Keys that have been exposed in hot environments should not be repurposed for treasury control. Recovery phrases must remain offline and securely stored.

For foundations and protocol treasuries, key management should be treated as infrastructure, not a personal wallet.

5. Establish Clear Operational Processes

Security improves when procedures are defined and documented.

Teams should clearly agree on:

  • Who can propose transactions
  • How approvals are coordinated
  • What qualifies as an emergency
  • How signer rotation is handled
  • What recovery process applies if a signer becomes unavailable

Operational process should also include a structured transaction review. Blind signing, approving a transaction without independently verifying its contents remains a common operational weakness.

Signers should verify:

  • Recipient addresses and token amounts
  • Contract functions being executed
  • Any approval or allowance changes

Where available, transaction simulation should be used as part of the review workflow. Safe compatible multisig supports transaction simulation through its infrastructure layer, allowing signers to preview execution results before approving.

At Palmera, we work with multiple simulation providers that can be integrated directly into a white-label multisig deployment for EVM chains, embedding risk checks into the signing process rather than relying on external tools.

If your chain is integrating multisig infrastructure and would like to include transaction simulation in your deployment, contact us to discuss the available integration options.

6. Separate Transaction Preparation from Approval

Not everyone who needs to initiate a transaction should hold signing authority.

In many organizations, the person assembling a payment batch, drafting a contract interaction, or preparing a grant distribution is not the same individual responsible for authorizing it.

Safe supports this separation natively through Proposers. A Proposer is an address authorized to prepare and submit transactions to the queue without the ability to sign or execute them. Owners review what was proposed and approve only after independent verification.

This model is particularly relevant for teams managing recurring distributions, capital allocation programs, or operational workflows where transaction preparation involves staff who should not hold custody.

For programmatic workflows, Safe also supports Delegates at the API level. Delegates serve the same purpose as Proposers but are managed through the Safe Transaction Service rather than the wallet interface. This enables scripts, bots, or backend systems to propose transactions without exposing signer keys.

In both cases, the principle remains consistent: those who prepare transactions should not be the same parties who approve them. Clear role separation reduces exposure to both human error and internal operational risk.

7. Be Deliberate with Modules and Extensions

Safe's modular architecture is one of its core strengths. Modules and guards allow teams to introduce additional logic, automation, delays, spending constraints, or execution policies without modifying the core contracts.

Flexibility, however, requires discipline.

Only necessary and audited modules should be enabled. Each module should have a clearly documented purpose, and configuration changes should be tested before being applied to production deployments. A minimal, well-understood configuration is generally more resilient than a highly customized one.

Within the Safe ecosystem, widely used extensions include the Zodiac module suite, which provides audited building blocks such as delay modifiers and policy enforcement modules. These can be deployed to introduce structured execution constraints when operational needs require them.

At Palmera, we have also developed the Palmera Module, an open-source and audited contribution to the Safe ecosystem. It is available for any team to use and reflects our ongoing work supporting production-grade multisig infrastructure.

For chains integrating multisig at the protocol level, we can deploy Zodiac modules, the Palmera Module, or support the development and integration of custom modules where specific operational requirements exist.

If your chain or organization requires tailored module logic as part of its multisig architecture, we are available to discuss implementation approaches.

8. Plan for Recovery Before You Need It

A multisig that cannot be recovered introduces structural risk. If enough signers become permanently unavailable and the threshold can no longer be reached, the funds in that multisig become inaccessible.

Recovery should be treated as a design-time decision, not an incident response.

Safe provides several recovery mechanisms through Safe{RecoveryHub}.

The most flexible option is Custom Decentralized Recovery. Signers designate a trusted Recoverer, which may be an EOA, hardware wallet, or another multisig. If signers lose access, the Recoverer can propose a new ownership configuration.

Recovery proposals are enforced with a time delay (default 28 days, configurable to 7, 14, or 56 days). During this period, existing signers can reject the proposal if unauthorized. The delay is powered by the audited Zodiac Delay Modifier. This two-step model proposal followed by delayed execution provides a meaningful intervention window.

For teams preferring stronger trust minimization, a recommended pattern is assigning a dedicated multisig as the Recoverer. A small group of 2–3 trusted individuals, each holding a key in a separate multisig with its own threshold, can act as recovery guardians. This ensures no single individual can initiate recovery unilaterally, and the loss of one guardian does not disable the recovery pathway.

Safe also supports the Candide Social Recovery Module, formally verified, enabling guardian-based recovery with configurable delay periods. For teams building with the ERC-7579 standard, the Safe7579 Adapter provides access to Rhinestone's audited module set, including social recovery and inactivity-based recovery mechanisms.

For organizations managing treasury across multiple chains, recovery configuration should be implemented and tested before it is required. The effort involved in setup is negligible compared to the operational risk of an inaccessible multisig.

9. Consider Timelocks for High-Impact Actions

For larger treasuries or upgrade authority, delayed execution mechanisms can introduce structured oversight.

Timelocks create review windows for significant transfers or contract upgrades. They are particularly relevant in environments where treasury management and development authority are separated.

Not every deployment requires a delay module. However, for governance-controlled capital or foundation reserves, additional execution buffers can reinforce operational discipline.

Clarifying Common Assumptions

Multisig strengthens shared control, but its effectiveness depends on configuration and operational discipline. Security does not derive from the number of signers alone. It depends on independence, review processes, and clearly defined responsibilities.

Similarly, modules and extensions increase flexibility but require understanding. Safe provides a robust smart account framework; organizations are responsible for designing how that framework is implemented in practice.

A Practical Baseline for Most Teams

For teams setting up a multisig for the first time:

  • Use a mix of hardware wallets and EOAs (for example, two hardware wallets and one EOA)
  • Start with a balanced threshold such as 2-of-3 or 3-of-5
  • Separate signers across individuals and locations
  • Establish review discipline early
  • Introduce modules only when operational needs justify them

As treasury size and operational complexity increase, the configuration should evolve accordingly.

Multisig security is not a one-time setup. It is an ongoing operational standard.

Saferemains the most widely used and battle-tested multisig implementation across the EVM ecosystem, and its flexibility allows organizations to design structures that match their risk profile.

The architecture matters. The process matters. The discipline matters.

About Palmera

Palmera provides technical infrastructure for multisig systems across blockchain ecosystems.

We deploy and maintain multisig smart contracts, infrastructure, and white-label interfaces compatible with Safe for EVM-compatible chains. We also build and operate ecosystem-specific multisig implementations, such as HyperSig in the Hyperliquid ecosystem, and can develop custom multisig solutions for non-EVM chains.

Our work is strictly technical. We focus on smart contract deployment, backend infrastructure, and production-grade multisig architecture. Palmera does not provide financial or investment services.

If your chain is integrating multisig infrastructure or building custom multisig solutions, we are available to discuss technical implementation.

P

Palmera

Multisig infrastructure provider for EVM chains