✓ Verified 💻 Development ✓ Enhanced Data

Lightning Security Module

Set up an lnd remote signer container that holds private keys separately from the agent.

Rating
3.9 (235 reviews)
Downloads
4,335 downloads
Version
1.0.0

Overview

Set up an lnd remote signer container that holds private keys separately from the agent.

Complete Documentation

View Source →

Lightning Security Module (Remote Signer)

Set up an lnd remote signer container that holds private keys on a separate, secured machine. The signer never routes payments or opens channels — it only holds keys and signs when asked by a watch-only litd node.

Architecture

text
Agent Machine                     Signer Machine (secure)
┌─────────────────┐              ┌─────────────────────┐
│  litd (watch-only)│◄──gRPC───►│  lnd (signer)        │
│  - neutrino      │             │  - holds seed         │
│  - manages chans │             │  - signs commitments  │
│  - routes pmts   │             │  - signs on-chain txs │
│  - NO key material│            │  - no p2p networking   │
└─────────────────┘              └─────────────────────┘

The watch-only node handles all networking and channel management. The signer node holds the seed and performs cryptographic signing. Even if the agent machine is fully compromised, the attacker cannot extract private keys.

See references/architecture.md for the full architecture explainer.

Quick Start (Container — Recommended)

On the Signer Machine

bash
# 1. Install lnd signer image
skills/lightning-security-module/scripts/install.sh

# 2. Start signer container
skills/lightning-security-module/scripts/start-signer.sh

# 3. Set up signer wallet and export credentials
skills/lightning-security-module/scripts/setup-signer.sh

# 4. Copy the credentials bundle to the agent machine
#    The setup script prints the bundle path and base64 string.

On the Agent Machine

bash
# 5. Import credentials bundle
skills/lnd/scripts/import-credentials.sh --bundle <credentials-bundle>

# 6. Start litd in watch-only mode
skills/lnd/scripts/start-lnd.sh --watchonly

# 7. Create watch-only wallet
skills/lnd/scripts/create-wallet.sh

# 8. Check status
skills/lnd/scripts/lncli.sh getinfo

Two-Container Local Setup

For testing both on the same machine:

bash
# Start litd + signer together
skills/lnd/scripts/start-lnd.sh --watchonly

# Set up signer wallet
skills/lightning-security-module/scripts/setup-signer.sh --container litd-signer

# Import credentials and create watch-only wallet
skills/lnd/scripts/import-credentials.sh --bundle ~/.lnget/signer/credentials-bundle
skills/lnd/scripts/create-wallet.sh --container litd

Installation

Default: pulls the lnd Docker image for the signer.

bash
skills/lightning-security-module/scripts/install.sh

This pulls lightninglabs/lnd:v0.20.0-beta from Docker Hub. The signer only needs plain lnd (not litd) since it only holds keys and signs.

Build from Source (Fallback)

bash
skills/lightning-security-module/scripts/install.sh --source

Native Mode

For running the signer without Docker:

bash
# Set up signer natively
skills/lightning-security-module/scripts/setup-signer.sh --native

# Start signer natively
skills/lightning-security-module/scripts/start-signer.sh --native

# Stop signer natively
skills/lightning-security-module/scripts/stop-signer.sh --native

Remote Nodes

Export credentials from a remote signer:

bash
skills/lightning-security-module/scripts/export-credentials.sh \
    --rpcserver signer-host:10012 \
    --tlscertpath ~/signer-tls.cert \
    --macaroonpath ~/signer-admin.macaroon

Credential Bundle Format

The exported bundle (~/.lnget/signer/credentials-bundle/) contains:

FilePurpose
accounts.jsonAccount xpubs for watch-only wallet import
tls.certSigner's TLS certificate for authenticated gRPC
admin.macaroonSigner's admin macaroon for RPC authentication
The bundle is also available as a single base64-encoded tar.gz file (credentials-bundle.tar.gz.b64) for easy copy-paste transfer between machines.

Scripts

ScriptPurpose
install.shPull lnd signer image (or build from source)
docker-start.shStart signer container
docker-stop.shStop signer container
setup-signer.shCreate signer wallet and export credentials
start-signer.shStart signer (delegates to Docker by default)
stop-signer.shStop signer (delegates to Docker by default)
export-credentials.shRe-export credentials from running signer

Managing the Signer

Start

bash
# Docker (default)
skills/lightning-security-module/scripts/start-signer.sh

# With network override
skills/lightning-security-module/scripts/start-signer.sh --network mainnet

Stop

bash
# Docker stop (preserve data)
skills/lightning-security-module/scripts/stop-signer.sh

# Docker stop + remove volumes
skills/lightning-security-module/scripts/stop-signer.sh --clean

Re-export Credentials

If TLS certificates or macaroons have been regenerated:

bash
skills/lightning-security-module/scripts/export-credentials.sh

Configuration

Container Config

The signer compose template is at skills/lightning-security-module/templates/docker-compose-signer.yml. Config is passed via command-line arguments.

Native Config

The native signer config template is at skills/lightning-security-module/templates/signer-lnd.conf.template. Key differences from a standard lnd node:

  • No P2P listening (--listen=) — signer doesn't route
  • RPC on 0.0.0.0:10012 — accepts connections from watch-only node
  • REST on localhost:10013 — local only, for wallet creation
  • TLS extra IP 0.0.0.0 — watch-only on a different machine can connect
  • No autopilot, no routing fees — signer is signing-only

Security Model

What stays on the signer:

  • 24-word seed mnemonic
  • All private keys (funding, revocation, HTLC)
  • Wallet database with key material
What gets exported:
  • Account xpubs (public keys only — cannot spend)
  • TLS certificate (for authenticated connection)
  • Admin macaroon (for RPC auth — scope down for production)
Threat model:
  • Compromised agent machine cannot sign transactions or extract keys
  • Attacker with agent access can see balances and channel state but not spend
  • Signer machine should have minimal attack surface
Production hardening:
  • Replace admin macaroon with a signer-only macaroon (see macaroon-bakery)
  • Restrict signer RPC to specific IP addresses via firewall
  • Run signer on dedicated hardware or a hardened VM
  • Use Lightning Node Connect (LNC) via lightning-mcp-server for read-only agent access

Macaroon Bakery for Signer

For production, bake a signing-only macaroon:

bash
skills/macaroon-bakery/scripts/bake.sh --role signer-only \
    --container litd-signer --rpc-port 10012

Then re-export the credentials bundle with the scoped macaroon.

Container & Ports

ContainerPurposePorts
litd-signerRemote signer (lnd)10012, 10013
PortServiceInterfaceDescription
10012gRPC0.0.0.0Signer RPC (watch-only connects here)
10013REST0.0.0.0REST for wallet creation

File Locations

PathPurpose
~/.lnget/signer/wallet-password.txtSigner wallet passphrase (0600)
~/.lnget/signer/seed.txtSigner seed mnemonic (0600)
~/.lnget/signer/credentials-bundle/Exported credentials
~/.lnget/signer/signer-lnd.confSigner config (native mode)
versions.envPinned container image versions

Installation

Terminal bash

openclaw install lightning-security-module
    
Copied!

💻Code Examples

└─────────────────┘ └─────────────────────┘

-.txt
The watch-only node handles all networking and channel management. The signer
node holds the seed and performs cryptographic signing. Even if the agent machine
is fully compromised, the attacker cannot extract private keys.

See [references/architecture.md](references/architecture.md) for the full
architecture explainer.

## Quick Start (Container — Recommended)

### On the Signer Machine

skills/lnd/scripts/lncli.sh getinfo

skillslndscriptslnclish-getinfo.txt
### Two-Container Local Setup

For testing both on the same machine:

skills/lnd/scripts/create-wallet.sh --container litd

skillslndscriptscreate-walletsh---container-litd.txt
## Installation

Default: pulls the lnd Docker image for the signer.

skills/lightning-security-module/scripts/install.sh

skillslightning-security-modulescriptsinstallsh.txt
This pulls `lightninglabs/lnd:v0.20.0-beta` from Docker Hub. The signer only
needs plain lnd (not litd) since it only holds keys and signs.

### Build from Source (Fallback)

skills/lightning-security-module/scripts/install.sh --source

skillslightning-security-modulescriptsinstallsh---source.txt
## Native Mode

For running the signer without Docker:

skills/lightning-security-module/scripts/stop-signer.sh --native

skillslightning-security-modulescriptsstop-signersh---native.txt
## Remote Nodes

Export credentials from a remote signer:

--macaroonpath ~/signer-admin.macaroon

---macaroonpath-signer-adminmacaroon.txt
## Credential Bundle Format

The exported bundle (`~/.lnget/signer/credentials-bundle/`) contains:

| File | Purpose |
|------|---------|
| `accounts.json` | Account xpubs for watch-only wallet import |
| `tls.cert` | Signer's TLS certificate for authenticated gRPC |
| `admin.macaroon` | Signer's admin macaroon for RPC authentication |

The bundle is also available as a single base64-encoded tar.gz file
(`credentials-bundle.tar.gz.b64`) for easy copy-paste transfer between machines.

## Scripts

| Script | Purpose |
|--------|---------|
| `install.sh` | Pull lnd signer image (or build from source) |
| `docker-start.sh` | Start signer container |
| `docker-stop.sh` | Stop signer container |
| `setup-signer.sh` | Create signer wallet and export credentials |
| `start-signer.sh` | Start signer (delegates to Docker by default) |
| `stop-signer.sh` | Stop signer (delegates to Docker by default) |
| `export-credentials.sh` | Re-export credentials from running signer |

## Managing the Signer

### Start

skills/lightning-security-module/scripts/stop-signer.sh --clean

skillslightning-security-modulescriptsstop-signersh---clean.txt
### Re-export Credentials

If TLS certificates or macaroons have been regenerated:

skills/lightning-security-module/scripts/export-credentials.sh

skillslightning-security-modulescriptsexport-credentialssh.txt
## Configuration

### Container Config

The signer compose template is at
`skills/lightning-security-module/templates/docker-compose-signer.yml`. Config
is passed via command-line arguments.

### Native Config

The native signer config template is at
`skills/lightning-security-module/templates/signer-lnd.conf.template`. Key
differences from a standard lnd node:

- **No P2P listening** (`--listen=`) — signer doesn't route
- **RPC on 0.0.0.0:10012** — accepts connections from watch-only node
- **REST on localhost:10013** — local only, for wallet creation
- **TLS extra IP 0.0.0.0** — watch-only on a different machine can connect
- **No autopilot, no routing fees** — signer is signing-only

## Security Model

**What stays on the signer:**
- 24-word seed mnemonic
- All private keys (funding, revocation, HTLC)
- Wallet database with key material

**What gets exported:**
- Account xpubs (public keys only — cannot spend)
- TLS certificate (for authenticated connection)
- Admin macaroon (for RPC auth — scope down for production)

**Threat model:**
- Compromised agent machine cannot sign transactions or extract keys
- Attacker with agent access can see balances and channel state but not spend
- Signer machine should have minimal attack surface

**Production hardening:**
- Replace admin macaroon with a signer-only macaroon (see `macaroon-bakery`)
- Restrict signer RPC to specific IP addresses via firewall
- Run signer on dedicated hardware or a hardened VM
- Use Lightning Node Connect (LNC) via `lightning-mcp-server` for read-only agent access

## Macaroon Bakery for Signer

For production, bake a signing-only macaroon:
example.txt
Agent Machine                     Signer Machine (secure)
┌─────────────────┐              ┌─────────────────────┐
│  litd (watch-only)│◄──gRPC───►│  lnd (signer)        │
│  - neutrino      │             │  - holds seed         │
│  - manages chans │             │  - signs commitments  │
│  - routes pmts   │             │  - signs on-chain txs │
│  - NO key material│            │  - no p2p networking   │
└─────────────────┘              └─────────────────────┘

Tags

#devops_and-cloud #security

Quick Info

Category Development
Model Claude 3.5
Complexity Multi-Agent
Author roasbeef
Last Updated 3/10/2026
🚀
Optimized for
Claude 3.5
🧠

Ready to Install?

Get started with this skill in seconds

openclaw install lightning-security-module