ForgeBox
Build it yourself. An open-source hardware platform for developers to build and deploy their own codes. Designed for developers.
1
Overview
Tech Specs
Build Freely. Execute Securely. Control Completely.
What is ForgeBox?

Advanced Security, Open to Your Code
ForgeBox is an open-sourced, research & development kit designed for Web3 geeks. It delivers a pure hardware foundation. Built on triple Secure Elements and PCI self-destruct, it grants you full authority to execute your own code.
View ForgeBox 101 on GitHub
From Concept to Code
Transform your boldest ideas into a running system on high-performance hardware.

Open-Source Velocity
Deploy your own code seamlessly for speed and transparency.

Hardware
A fortress-grade base featuring 3 SE chips, PCI self-destruct, biometric security and full open-source transparency.
![Hardware ,[object Object]](/assets/feature3-BObYA1BN.webp)
, Your Code
Ultimate execution integrity: the device only boots code signed by your private key.
![[object Object],, Your Code](/assets/feature4-ByZXgdev.webp)

Command Your Trust Root
Take absolute command. Define security and permissions from the very bottom of the stack.
No predefined scenarios. We provide the power; your design defines the frontier.
If you can code it, ForgeBox can run it.

Experimental Crypto & Signatures

Personal HSM & Security Protocols

New Chains & Wallet Protocols

Next-Gen Auth & Identity

Latest BIPs Implementation
Frequently Asked Questions
How is ForgeBox different from Keystone 3 Pro? Can I use it if I don't know how to code?
ForgeBox is an R&D kit that provides a security foundation but comes with no pre-installed features; it requires the ability to write your own code. Keystone 3 Pro is a ready-to-use hardware wallet with official firmware. If you cannot code, ForgeBox is not for you. Please choose Keystone 3 Pro.
How do I get started with ForgeBox?
Please visit our open-source CLI tool and documentation via our GitHub. Establish your Root of Trust by registering your public key; the hardware will thereafter ensure only code signed by your corresponding private key can execute.
What should I keep in mind when running custom firmware?
Please ensure you securely store your signing key pair and fully acknowledge that the code aligns with your R&D purpose; you take full responsibility for the security and functionality of the code you sign.
You May Also Like

Keystone 3 Pro <> MetaMask
$249

Keystone 3 Pro Customization
$249

Keystone 3 Pro Co-Branded Version
$199











