Modular, no_std-compatible Rust toolkit for multi-chain HD wallet derivation — 10 chains, one seed, zero hand-written cryptography.
Kobe derives standards-compliant addresses for Bitcoin, Ethereum, Solana, Cosmos, Tron, Sui, TON, Filecoin, and Spark from a single BIP-39 mnemonic. All library crates compile under no_std + alloc and zeroize sensitive material on drop.
Shell (macOS / Linux):
curl -fsSL https://sh.qntx.fun/kobe | shPowerShell (Windows):
irm https://sh.qntx.fun/kobe/ps | iexOr via Cargo:
cargo install kobe-cli# Generate wallets
kobe btc new # Bitcoin (Native SegWit)
kobe btc new -a taproot -w 24 -c 5 # 5 Taproot addresses, 24 words
kobe evm new # Ethereum (MetaMask-compatible)
kobe evm new --style ledger-live -c 3 # Ledger Live style, 3 accounts
kobe svm new # Solana (Phantom-compatible)
kobe cosmos new # Cosmos Hub
kobe sui new # Sui
kobe ton new # TON
# Import from mnemonic
kobe evm import -m "abandon abandon ... about"
# JSON output (for scripts / agents)
kobe evm new --jsonuse kobe::{Wallet, Derive};
use kobe::evm::Deriver; // or kobe::btc, kobe::svm, kobe::cosmos, ...
// Import from mnemonic
let wallet = Wallet::from_mnemonic(
"abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon about",
None, // optional passphrase
)?;
// Derive addresses
let eth = kobe::evm::Deriver::new(&wallet).derive(0)?;
let btc = kobe::btc::Deriver::new(&wallet, kobe::btc::Network::Mainnet)?.derive(0)?;
let sol = kobe::svm::Deriver::new(&wallet).derive(0)?;
println!("ETH: {}", eth.address); // 0x9858EfFD232B4033E47d90003D41EC34EcaEda94
println!("BTC: {}", btc.address); // bc1qcr8te4kr609gcawutmrza0j4xv80jy8z306fyu
println!("SOL: {}", sol.address); // HAgk14JpMQLgt6rVgv7cBQFJWFto5Dqxi472uT3DKpqk// Generate new wallet
let wallet = Wallet::generate(12, None)?; // 12-word mnemonic
println!("Mnemonic: {}", wallet.mnemonic());- 10 chains — Bitcoin, Ethereum, Solana, Cosmos, Tron, Sui, TON, Filecoin, Spark — one BIP-39 seed
- HD standards — BIP-32, BIP-39, BIP-44/49/84/86, SLIP-10
- Derivation styles — Standard, Ledger Live, Ledger Legacy, Trust, Phantom, Backpack
no_std+alloc— All library crates compile withoutstd; embedded / WASM ready- Zeroizing — Private keys, seeds, and intermediate material wrapped in
Zeroizing<T> - Shared infrastructure — SLIP-10 Ed25519 and BIP-32 secp256k1 derivation in
kobe-core - KAT-verified — Every chain has Known Answer Tests cross-verified with Python
- Strict linting — Clippy
pedantic+nursery+correctness(deny), zero warnings
See crates/README.md for the full crate table, dependency graph, and feature flag reference.
The camouflage feature provides entropy-layer XOR encryption that transforms a real BIP-39 mnemonic into a different but fully valid BIP-39 mnemonic. The camouflaged mnemonic is indistinguishable from any ordinary mnemonic — it even generates a real (empty) wallet.
How it works:
Real Mnemonic → Entropy (128–256 bit) → XOR(PBKDF2(password)) → New Entropy → Decoy Mnemonic
- The real mnemonic is decoded into its raw entropy (128, 160, 192, 224, or 256 bits).
- A key of matching length is derived from the password via PBKDF2-HMAC-SHA256 (600,000 iterations).
- The entropy is XORed with the derived key to produce new entropy.
- The new entropy is re-encoded as a valid BIP-39 mnemonic with a correct checksum.
Decryption is the same operation — XOR is its own inverse.
Supported word counts: 12, 15, 18, 21, and 24 words.
Security properties:
| Property | Detail |
|---|---|
| Valid output | Decoy mnemonic passes all BIP-39 validation and generates a real wallet |
| Stateless | No files, databases, or extra data — just the password |
| Deterministic | Same input + password always produces the same output |
| Password-bound | Security strength equals the password entropy |
| Brute-force resistant | PBKDF2 with 600K iterations (OWASP 2023 recommendation) |
Note: This is not the BIP-39 passphrase (25th word). BIP-39 passphrases alter seed derivation; camouflage alters the mnemonic entropy itself.
use kobe::camouflage;
// Encrypt (camouflage)
let decoy = camouflage::encrypt("real mnemonic ...", "password")?;
// Decrypt (recover)
let original = camouflage::decrypt(&decoy, "password")?;kobe mnemonic encrypt -m "abandon abandon ... art" -p "strong-password"
kobe mnemonic decrypt -c "decoy abandon ... xyz" -p "strong-password"This library has not been independently audited. Use at your own risk.
- Private keys and seeds use
zeroizefor secure memory cleanup - No key material is logged or persisted
- Random generation uses OS-provided CSPRNG via
getrandom - Secp256k1 contexts are cached to avoid repeated allocations
- Environment variable manipulation is disallowed at the lint level
Licensed under either of:
- Apache License, Version 2.0 (LICENSE-APACHE or https://www.apache.org/licenses/LICENSE-2.0)
- MIT License (LICENSE-MIT or https://opensource.org/licenses/MIT)
at your option.
Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in this project shall be dual-licensed as above, without any additional terms or conditions.
