Connect LOBSTR Vault multisig signing and Stellar account data to your stack — without ever touching a private key
LOBSTR Vault is the signer app for the Stellar network: it stores an encrypted local signer key, receives pending transactions, and approves or rejects them on-device. We deliver authorized integrations around that flow — pending-transaction webhooks, account.signers verification, signed-XDR submission to the Vault transactions endpoint, and read-only statement export via the Stellar Horizon API. Everything follows Open Banking-style consent and audit patterns adapted for self-custody crypto.
account.signers array, weights, and low/medium/high thresholds for each protected Stellar wallet — letting auditors confirm an account is genuinely under n-of-m control.Feature modules we implement
Each module below names the exact data or capability it exposes and one concrete operational use. We scope only what you are authorized to access and keep signing keys out of every integration path.
1 · Pending-transaction relay API
Mirrors the in-app queue: when a wallet such as LOBSTR, StellarX or StellarPort posts a transaction for a Vault-protected account, your backend receives the signed XDR, decoded operations, source account, memo, fee and required-signers list. Concrete use: a treasury approval board that shows "3 transactions waiting, 2 of 3 signatures collected".
2 · Signer-set & threshold verification
Reads account.signers from Horizon, classifies each signer (master key, additional ed25519 keys, the well-known Vault co-signer), and reports weights against low/medium/high thresholds. Concrete use: a compliance check that flags any monitored account whose master-key weight is still non-zero, i.e. not yet truly multisig.
3 · Signed-XDR submission & result tracking
Wraps the Vault transactions endpoint (POST a transaction envelope XDR) and Horizon's POST /transactions for the final broadcast, returning the transaction hash, ledger, and success/result codes. Concrete use: a payout service that submits a co-signed batch and stores the resulting hashes for audit.
4 · Statement & balance export
Pulls /accounts/{id}/transactions, /operations, /effects and balances with cursor paging and date filters, then renders CSV, JSON or PDF statements per account or per asset. Concrete use: month-end reconciliation of XLM and issued-token movement against an internal ledger.
5 · Push-notification fan-out
Re-emits the "new transaction request" event LOBSTR Vault shows on the signer device as a webhook or message-queue event for your systems (Slack, PagerDuty, an internal bot). Concrete use: alerting an operations team within seconds of a high-value transfer entering the approval queue.
6 · Vault Signer Card (NFC) flow notes
Documents the Tangem-built Signer Card path — the chip creates and holds an uncopyable signer account; a tap over NFC produces a signed transaction. Concrete use: a 2-of-3 setup where a card is the offline backup signer, plus runbook copy for your support team.
Data available for integration (OpenData perspective)
The table maps each data type to the screen or feature it originates from, its granularity, and a typical downstream use. Items marked "Horizon" come from the public Stellar Horizon API; items marked "Vault flow" come from the app's own pending-transaction and submission pipeline. Nothing here includes a private key — keys stay encrypted on the device or inside the Signer Card chip.
| Data type | Source (screen / feature) | Granularity | Typical use |
|---|---|---|---|
| Pending transaction (XDR + decoded ops) | "Transactions" inbox / push notification (Vault flow) | Per transaction: operations, source, memo, fee, sequence, required signers | Approval workflows, risk review, four-eyes controls |
| Signature progress | Transaction detail screen (Vault flow) | Per transaction: signatures collected vs. threshold needed | Treasury status dashboards, SLA tracking on approvals |
| Signer set & weights | Multisig configuration (Horizon account.signers) | Per account: signer keys, weights, low/med/high thresholds | Compliance verification that an account is n-of-m protected |
| Confirmed transactions & operations | Account history (Horizon) | Per ledger entry: hash, ledger, ops, effects, paths | Reconciliation, accounting sync, audit trails |
| Asset balances | Account overview (Horizon) | Per account & asset: balance, trustline limits, liquidity-pool shares | Portfolio reporting, exposure monitoring |
| Submission results | "Approve" action (Vault transactions endpoint + Horizon submit) | Per submission: tx hash, result codes, ledger, timestamp | Settlement confirmation, exception handling, alerting |
| Account / device linkage | Onboarding & "Manage signers" (Vault flow) | Which signer device/card protects which Stellar wallet(s) | Inventory of multisig architecture across an organization |
Typical integration scenarios
Five end-to-end flows we have scoped for crypto desks, token issuers, custodians and DAOs. Each lists the business context, the data and API involved, and how it maps to OpenData / OpenFinance thinking.
A · Corporate treasury approval board
Context: a company holds operating funds on a Stellar account secured 2-of-3 with LOBSTR Vault. Finance wants a web board, not three phones. Data/API: pending-transaction relay (XDR + decoded ops, signature progress) plus the Vault submission endpoint once enough approvals exist. OpenFinance mapping: the board is a consent-scoped "read your queued payments" surface, mirroring an Open Banking payment-initiation review screen — but the actual authorization stays on each signer's device.
B · Exchange / custodian listing check
Context: a venue must confirm a customer's Stellar account is genuinely under multisig before raising withdrawal limits. Data/API: Horizon GET /accounts/{id} → inspect signers for the documented Vault co-signer public key and confirm master-key weight is zero. OpenFinance mapping: equivalent to an account-information "control verification" call before extending services.
C · Accounting & tax reconciliation
Context: month-end close needs every XLM and issued-token movement reconciled to an ERP ledger. Data/API: statement export over /accounts/{id}/transactions, /operations, /effects with cursor paging; output CSV/JSON keyed by paging_token. OpenFinance mapping: a classic account-aggregation / statement-feed pattern applied to an on-chain account.
D · Real-time payout pipeline
Context: a payments product builds transactions in its backend, needs co-signature from a Vault-held key, then broadcasts. Data/API: build envelope → POST XDR to the Vault transactions endpoint → wait for the co-signature webhook → submit to Horizon POST /transactions → record hash and result codes. OpenFinance mapping: payment initiation with strong customer authentication, where the "second factor" is the multisig signer.
E · DAO / multi-party governance log
Context: a DAO runs an n-of-m treasury and wants a public, tamper-evident log of who approved what. Data/API: pending-transaction relay + submission results, written to an append-only store and surfaced on a status page. OpenFinance mapping: transparent transaction-history sharing with explicit member consent — open data in the literal sense.
Technical implementation
Below are representative request/response shapes we deliver — auth, a verification call, a submission call, and a webhook payload. Endpoint names and fields follow the public Stellar Horizon API and the LOBSTR Vault transaction-submission flow; exact paths are confirmed against the live service during scoping.
1 · Verify an account is Vault-protected (Horizon, read-only)
GET https://horizon.stellar.org/accounts/GABC...XYZ
Accept: application/json
// 200 OK (trimmed)
{
"account_id": "GABC...XYZ",
"thresholds": { "low_threshold": 10, "med_threshold": 20, "high_threshold": 20 },
"signers": [
{ "key": "GABC...XYZ", "weight": 0, "type": "ed25519_public_key" }, // master disabled
{ "key": "GA2T6GR7...PROTECTEDBYLOBSTRVAULT", "weight": 10, "type": "ed25519_public_key" },
{ "key": "GDEVICE...2NDKEY", "weight": 10, "type": "ed25519_public_key" }
],
"balances": [ { "asset_type": "native", "balance": "1042.5000000" } ]
}
// Logic: master weight 0 + Vault co-signer present + weight sum >= high_threshold => multisig OK
2 · Submit a transaction for Vault co-signature
POST https://vault.lobstr.co/api/transactions/
Content-Type: application/json
{ "xdr": "AAAAAgAAAAB...<base64 TransactionEnvelope>..." }
// Accepted -> the signer device shows a push notification.
// If "reject unsigned" protection is enabled and the XDR carries no valid
// signature, the API returns an error instead of queuing it:
// 400 { "error": "transaction must contain at least one valid signature" }
// After the signer approves, your webhook (module 1/5) fires:
{ "event": "transaction.signed",
"tx_hash": "9f1c...e7", "account_id": "GABC...XYZ",
"signers_collected": 2, "signers_required": 2, "signed_xdr": "AAAAAg...==" }
3 · Pull a statement page (Horizon, paged)
GET https://horizon.stellar.org/accounts/GABC...XYZ/transactions?limit=50&order=desc&cursor=
// 200 OK -> _embedded.records[]: { id, hash, ledger, created_at,
// source_account, fee_charged, memo, operation_count, paging_token }
// Loop on paging_token until _embedded.records is empty,
// then map each record to a CSV/JSON statement row. Wrap 429/5xx
// with exponential backoff; Horizon rate-limits per IP.
4 · Backend auth for our hosted API (pay-per-call mode)
POST https://api.openfinance-lab.com/v1/auth/token
Content-Type: application/json
{ "client_id": "...", "client_secret": "...", "scope": "vault.read vault.submit" }
// 200 OK { "access_token": "eyJ...", "expires_in": 3600, "token_type": "Bearer" }
GET https://api.openfinance-lab.com/v1/lobstr-vault/accounts/GABC.../pending
Authorization: Bearer eyJ...
// 200 OK { "pending": [ { "tx_hash": "...", "operations": [...],
// "signers_collected": 1, "signers_required": 2 } ] }
// Errors: 401 invalid_token · 403 scope_missing · 404 account_not_monitored · 429 rate_limited
Data flow / architecture
A simple, four-node pipeline keeps the design auditable:
1) Source — LOBSTR Vault app / Vault Signer Card / Stellar Horizon → 2) Ingestion — our connector polls Horizon and listens to the Vault submission flow, normalises XDR and signer sets → 3) Storage — encrypted, append-only event store (transactions, signatures, results) with consent and access logs → 4) Output — your webhooks, REST endpoints, CSV/JSON/PDF statements, and dashboards. No private keys enter any node; signing happens only on the device or card.
Compliance & privacy
We operate only under your authorization or via documented public Stellar APIs, and we never request, transmit, or store private keys — that is the whole point of LOBSTR Vault's local key storage. Relevant frameworks we design against include the EU Markets in Crypto-Assets Regulation (MiCA) for crypto-asset service providers, the FATF "Travel Rule" for VASP transfers, and GDPR-style data minimization and retention limits. Integrations ship with consent records, scoped access tokens, and an audit log of every read and submission. Where you act as a regulated entity, we align deliverables with your existing AML/KYC and record-keeping obligations.
Standards & building blocks
- Stellar Horizon API — accounts, signers, thresholds, transactions, operations, effects
- Stellar Ecosystem Proposals — SEP-7 transaction URIs, SEP-10 web auth, SEP-30 recoverable accounts
- LOBSTR Vault transaction-submission flow (signed XDR) — open source, GNU GPL v3.0
account.signersverification pattern already used by StellarTerm, StellarX, LOBSTR and Stellarport- Tangem-built Vault Signer Card (NFC) — offline / backup co-signer documentation
What we deliver
Deliverables checklist
- API specification (OpenAPI / Swagger) for the pending-transaction, verification, submission and statement endpoints
- Protocol & flow report: how the Vault app queues, signs and submits transactions; Horizon endpoints used; Signer Card NFC path
- Runnable source for the connector and sample integration (Python and Node.js), with config for mainnet and test network
- Webhook receiver sample + retry/idempotency handling for
transaction.signedevents - Automated tests, Postman/HTTP collection, and end-user-style API documentation
- Compliance notes: consent records, retention defaults, MiCA / FATF Travel Rule alignment, key-handling policy (we hold none)
Engagement workflow
- Scope confirmation: accounts/signers in scope, data needed (pending tx, signer sets, history, balances), mainnet vs. testnet.
- Protocol analysis & API design (2–5 business days, complexity-dependent).
- Build & internal validation against Horizon and a test signer (3–8 business days).
- Docs, samples, test cases (1–2 business days).
- Typical first delivery: 5–15 business days; third-party approvals or hardware (Signer Card) logistics may extend timelines.
Market positioning & user profile
LOBSTR Vault, published by ULTRA STELLAR, LLC, sits at the security layer of the Stellar ecosystem rather than competing as a day-to-day wallet. Its users span both ends: individual Stellar holders who add a second device or a Vault Signer Card to protect a personal wallet, and B2B users — token issuers, exchanges, custodians, payment startups and DAOs — running n-of-m treasuries. Distribution is global and English-first, with Android and iOS apps plus the Tangem-built NFC Signer Card; the app reached the 3.4.x line in 2024 and is tightly integrated with the consumer LOBSTR wallet while remaining compatible with most Stellar wallets and exchanges. For an integration studio, that means the demand is less "log in and read my bank" and more "show, verify and orchestrate multisig approvals across many accounts and devices" — which is exactly the OpenData / OpenFinance surface this page describes.
Screenshots
Tap any screenshot to enlarge. Images are loaded from the Google Play CDN; the default view stays compact.
Similar apps & integration landscape
Teams that adopt LOBSTR Vault usually touch several other tools in the Stellar and broader multisig ecosystem. We list them here as part of the integration landscape — not as a ranking — because organisations frequently need unified transaction exports, signer-set checks, or approval feeds that span more than one of these products.
- LOBSTR Wallet (Stellar & XRP) — the consumer wallet from the same team; holds balances, trustlines and transaction history, and is the most common place a Vault-protected transaction is first proposed.
- Solar Wallet — a Stellar wallet with its own multisig and account-management features; users often want one approval view across Solar-managed and Vault-managed accounts.
- Freighter — the Stellar Development Foundation's self-custody wallet and dApp connector; integration teams reconcile dApp-initiated transactions with Vault co-signatures.
- xBull Wallet — a Stellar wallet and dApp signer; relevant when transactions originate from xBull and must collect a Vault signature before broadcast.
- StellarTerm — an open-source Stellar client and DEX interface that already understands the Vault co-signer; a natural reference point for signer-set verification.
- StellarX — a trading front-end on the Stellar DEX; orders placed there on a multisig account flow through the same pending-transaction pattern.
- Stellarport — a browser-based Stellar wallet that supports Vault-protected accounts; included for the same statement-and-signers export needs.
- Tangem — the smart-card platform behind the Vault Signer Card; teams that use Tangem cards elsewhere want consistent NFC signing runbooks.
- Safe{Wallet} (formerly Gnosis Safe) — the leading EVM multisig "smart account"; organisations running treasuries on both Stellar and Ethereum often want a single approval dashboard spanning Vault and Safe.
- Ledger Live — hardware-wallet companion app with Stellar support; relevant when a Ledger device is one of the signers in an n-of-m setup alongside LOBSTR Vault.
- Vibrant — a Stellar-based wallet focused on stablecoins and everyday transfers; useful context when reconciling cross-app token movement.
About us
We are an independent technical service studio focused on App interface integration, authorized API integration, and open-data work in fintech and crypto. Our engineers come from payment gateways, digital banks, blockchain infrastructure, and protocol-analysis backgrounds, and we ship end-to-end deliverables — from reverse engineering and protocol analysis to runnable source code, documentation and test plans — under clear security and compliance constraints.
- Stellar/Horizon connectors, multisig orchestration, and on-chain statement pipelines
- OpenData / OpenFinance / OpenBanking-style consent and audit design adapted for self-custody
- Custom Python / Node.js / Go SDKs, webhook receivers, and test harnesses
- Full pipeline: protocol analysis → build → validation → compliance review
- Source code delivery from $300 — you receive runnable API source code and full documentation; pay after delivery upon satisfaction
- Pay-per-call API billing — call our hosted endpoints and pay only per call, no upfront cost; ideal for teams that prefer usage-based pricing
Contact
For a quote, or to submit your target app and requirements (the Stellar accounts/signers in scope and the data you need), open our contact page:
Reference: app "LOBSTR Vault. Multi-signature" · package com.lobstr.stellar.vault. We will confirm scope, authorization and timelines before any work begins.
FAQ
What do you need from me to start a LOBSTR Vault integration?
The target app name (provided), the Stellar accounts or signer public keys in scope, the data you want (pending transactions, signer sets, transaction history, balances), and any sandbox or test-network credentials. We work only under your authorization or with documented public Stellar/Horizon APIs.
How long does delivery take?
Usually 5 to 12 business days for a first API drop with documentation. A read-only Horizon and account.signers monitor is faster; full pending-transaction webhook plus XDR submission and statement export pipelines take longer.
How do you handle compliance and key safety?
We never request or store private keys. Signing stays on the Vault app or the Tangem-built Vault Signer Card. We follow GDPR-style data minimization, keep consent and audit logs, align with the FATF Travel Rule and the EU MiCA regime for crypto-asset service providers, and sign NDAs when required.
Is LOBSTR Vault open source, and can you build on it directly?
Yes. LOBSTR Vault is released under the GNU GPL v3.0 with public Android and iOS repositories, so we can reference the official transaction-submission flow (the Vault transactions endpoint that accepts a signed XDR) and the account.signers verification pattern already used by StellarTerm, StellarX, LOBSTR and Stellarport.
📱 Original app overview — LOBSTR Vault. Multi-signature (appendix)
LOBSTR Vault is described by its publisher as the most secure and user-friendly solution for multisignature protection on the Stellar network. You create a locally stored signer account on your mobile device, configure multisig protection, and receive pending transactions inside the app — then verify the details and approve or reject each one.
Multisignature security. No matter which wallet holds your funds, a single private key is a single point of failure. Enabling multisig increases the security of a Stellar account and protects it from in-person attacks as long as the keys are stored separately; the Vault helps secure funds even if one key is compromised or stolen.
Local key storage. The app generates a locally stored signer account during onboarding and uses it to confirm pending transactions on-device. Each account's private key is fully encrypted, stored in the device's local storage, and never touches the company's servers.
Confirm transactions. Once a Stellar account is protected with LOBSTR Vault, pending transactions are sent to the signer device within seconds, with a push notification for each incoming request; you review the details and approve if everything checks out.
Control your security level. Suited to pros and novices alike, the app can express any multisig configuration — one Vault signer for one or many wallets, or a sophisticated n-of-m setup requiring approvals from several signers per transaction. Craft your own architecture: one signer per multiple wallets, many signers per one wallet, or both.
Use with your favorite wallet. The Vault app is fully integrated with the LOBSTR wallet and works with most wallets and exchanges on the Stellar network; multisig can be enabled in a few clicks.
Vault Signer Card. A highly-secure chip embedded into the Signer Card creates and holds a unique, uncopyable Vault signer account within the card itself; used with LOBSTR Vault, it takes a multisig configuration further. (Built in partnership with Tangem, using NFC.)
Support. For issues or further assistance, the publisher directs users to support@lobstr.co. Developer: ULTRA STELLAR, LLC. Package ID: com.lobstr.stellar.vault. Platforms: Android and iOS. This appendix paraphrases the app's public store description for context; it is not an endorsement, and this page is an independent technical-integration positioning document.