Two-path vault with recovery key and hot key. The recovery key (cold sweep) can sign immediately with no delay. The hot key requires a CSV delay before spending is valid. Combines custody tiering and time-delayed authorization in a single block.
CovenantInvertible
Ladder Diagram
Fields
Field
Data Type
Size
Side
Description
hot_delay
NUMERIC
1-4 B
Conditions
Number of blocks the hot key path must wait (CSV relative timelock).
signer_key
PUBKEY
32-33 B
Witness
Public key of the signer — either the recovery key or the hot key. Only the key being used is revealed; the evaluator checks which commitment it matches.
signature
SIGNATURE
64-65 B
Witness
Signature from the revealed key (recovery or hot).
Both public keys folded into Merkle leaf via merkle_pub_key (PubkeyCountForBlock = 2). No key fields in conditions.
The 144-block delay (~1 day) gives the cold key holder time to detect unauthorized hot key usage and sweep funds using the recovery path before the hot spend confirms.
Worked Example
Vault with 144-block hot delay
UTXO locked with VAULT_LOCK: recovery_commit + hot_commit + delay=144
Scenario A (emergency recovery): Owner detects compromise, signs with cold key
Signature verifies against recovery key → SATISFIED immediately
Scenario B (normal spend): Hot key signs, tx has nSequence ≥ 144
Signature verifies against hot key, CheckSequence(144) passes → SATISFIED
Scenario C (premature hot spend): Hot key signs but only 50 blocks elapsed
Signature valid but CheckSequence(144) fails → UNSATISFIED
Use Cases
Bitcoin Vaults
Traditional vault pattern where day-to-day spending uses the hot key with a mandatory delay, while a cold recovery key can sweep funds immediately if the hot key is compromised. The delay window is the detection-and-response period.
Tiered Custody
Corporate treasury with an operations key (hot, delayed) and a board-level override key (recovery, instant). The board can intervene during the delay period if an unauthorized transaction is initiated by the operations team.
Emergency Recovery
Personal cold storage with a hardware wallet as the recovery key and a mobile wallet as the hot key. If the phone is stolen, the hardware wallet can sweep all funds immediately before the attacker's delayed spend confirms.