Current Role
Wallets authorize value transfer and signed protocol actions
Use wallets to provision addresses, sign protocol payloads, move tokens, and maintain a clean custody boundary between application logic and privileged signing material. In the current public stack, the strongest documented paths are CLI wallet operations, Python dual-key signing, and offline handoff for external custody systems.
Wallet creation, mnemonic import, signed transfers, and any workflow that needs account-level authorization.
Seal inspection, explorer checks, diagnostics, and other read-only protocol queries can be run without placing signing keys on the same host.