When you connect a crypto trading bot to your exchange, you are handing over the ability to trade your money. How and where your API keys are stored is not a technical detail you can ignore. It is the single most important security decision you will make as an automated trader.
This article examines the two fundamental API key storage models, analyzes the real-world 3Commas breach that exposed 100,000 keys, and explains why the architecture of your trading platform matters more than its encryption promises.
Understanding API Keys and What They Control
An exchange API key is a pair of credentials, a public key and a secret key, that grants programmatic access to your exchange account. Depending on the permissions you enable, an API key can:
- Read your balances, positions, and order history
- Trade by placing, modifying, and canceling orders
- Withdraw funds to external wallets (if withdrawal permission is enabled)
Most bot platforms instruct you to create API keys with read and trade permissions but without withdrawal access. This is a critical safety measure: even if your keys are compromised, the attacker cannot withdraw your funds directly. However, they can execute trades on your account, which enables market manipulation attacks (buying illiquid tokens to pump their own holdings) and can drain your account value rapidly through deliberate bad trades.
The key takeaway: trade-only API keys are not safe to have compromised. They are safer than full-access keys, but an attacker with your trade-enabled API key can still do serious financial damage.
The Two API Key Storage Models
Every crypto trading bot platform falls into one of two architectural categories. Understanding the difference is essential for making an informed security decision.
Model 1: Custodial (Cloud-Stored Keys)
The traditional model, used by 3Commas, Cryptohopper, Bitsgap, TradeSanta, and most other platforms, works like this:
- You create API keys on your exchange
- You paste them into the bot platform's web dashboard
- The platform encrypts and stores your keys on its servers
- The platform's cloud infrastructure uses your stored keys to execute trades
The platform promises to encrypt your keys at rest, use secure infrastructure, and limit internal access. These are standard security practices, and reputable platforms implement them seriously.
But the fundamental problem remains: your keys exist on someone else's servers. No matter how well-encrypted they are at rest, they must be decrypted to execute trades. This creates a window of vulnerability. If an attacker gains sufficient access to the platform's infrastructure, they can intercept keys during this decryption window or access the decryption keys themselves.
Model 2: Signal-Push (Zero-Knowledge)
The signal-push architecture eliminates this vulnerability entirely by ensuring the platform never possesses your API keys at any point:
- You create API keys on your exchange
- You store them locally on your own device or private server
- The platform generates trading signals in the cloud based on your strategy
- Signals are pushed to your local execution client via encrypted WebSocket
- Your local client uses your locally stored keys to execute trades on the exchange
The platform knows what trade to make but has zero knowledge of how to execute it on your account. Even a complete breach of the platform's servers yields nothing useful to an attacker, since there are no keys to steal.
Sentinel Bot is the only major crypto trading bot platform that uses this model. The trade-off is that you need to run a lightweight execution client, either as a desktop application or a Docker container, but the security gain is categorical, not incremental.
The 3Commas Breach: A Case Study
In December 2022, 3Commas confirmed what security researchers had been warning about for weeks: API keys stored on their platform had been exposed. Here is what happened and why it matters for every bot user.
Timeline
- October 2022: Users began reporting unauthorized trades on their exchange accounts. Binance CEO Changpeng Zhao publicly stated he was "fairly confident" there were API key leaks from 3Commas.
- November 2022: 3Commas initially denied any breach, suggesting affected users had fallen for phishing attacks.
- December 10, 2022: An anonymous hacker published a dataset containing approximately 100,000 3Commas API keys on Pastebin.
- December 11, 2022: 3Commas CEO Yuriy Sorokin acknowledged the breach, confirming the leaked data was genuine.
Impact
The exposed API keys gave attackers trade access to tens of thousands of exchange accounts across Binance, KuCoin, Coinbase, and other platforms. While exact total losses are disputed, individual reports documented losses ranging from $5,000 to $500,000+ per affected user. The primary attack vector was market manipulation: attackers used compromised accounts to buy low-liquidity tokens at inflated prices, profiting from their own holdings.
Lessons
The 3Commas breach was not caused by negligent security practices in the traditional sense. The platform used encryption and followed standard security protocols. The vulnerability was architectural: any platform that stores thousands of API keys creates a high-value target. A single successful breach yields access to every user simultaneously.
This is not unique to 3Commas. Any custodial bot platform, including Cryptohopper, Bitsgap, TradeSanta, and others, has the same architectural vulnerability. The question is not if they will be targeted, but when, and whether their defenses hold.
How Signal-Push Architecture Eliminates This Risk
In a zero-knowledge architecture, the 3Commas scenario is structurally impossible. Here is why:
- No centralized key store: There is no database of API keys to breach. Each user's keys exist only on their own device.
- No decryption window: The platform never encrypts or decrypts your keys because it never possesses them.
- Distributed target: An attacker would need to compromise each individual user's device separately, an impractical attack at scale.
- Breach containment: Even if one user's device is compromised, no other user is affected. The blast radius of any single breach is limited to one account.
The execution client itself is open-source and runs locally, so you can inspect exactly what it does. It connects to the platform's WebSocket server, receives trade signals, and executes them using your local API keys. The signal payload contains the trading pair, direction, position size, and risk parameters, but never any credentials.
Best Practices for API Key Security
Regardless of which platform you use, follow these practices to minimize your risk.
Exchange-Side Protections
- Never enable withdrawal permissions on API keys used for bot trading. There is no legitimate reason a trading bot needs to withdraw funds.
- Whitelist IP addresses if your exchange supports it. This ensures your API key can only be used from specific IP addresses. For custodial bots, whitelist the platform's server IPs. For signal-push bots, whitelist your own device's IP.
- Create separate API keys for each platform or service. Never reuse keys across multiple services.
- Set trading restrictions where possible. Some exchanges let you restrict API keys to specific trading pairs, preventing misuse on illiquid markets.
- Rotate keys regularly. Change your API keys every 90 days or immediately if you suspect any compromise.
Platform Selection Criteria
- Prefer signal-push over custodial for any serious trading capital. The security advantage is architectural, not marginal.
- Check breach history. Has the platform ever had a security incident? How did they respond? Transparency after a breach is more trustworthy than claiming no breach has ever occurred.
- Verify open-source components. Can you inspect the execution client code? Platforms that open-source their client-side code demonstrate confidence in their security model.
- Test with a small amount first. Before connecting your main exchange account, create a sub-account with limited funds and test the platform for at least 30 days.
Device-Side Security (for Signal-Push Users)
If you use a signal-push bot like Sentinel, your local device becomes the security perimeter:
- Keep your OS and software updated. Unpatched vulnerabilities are the most common attack vector.
- Use a dedicated device or VPS for bot execution. Do not run the execution client on a machine you also use for general browsing and email.
- Enable full-disk encryption on the device storing your API keys.
- Use a firewall to restrict network access to only the necessary connections (exchange APIs and the bot platform's WebSocket server).
Security Checklist
Use this checklist when evaluating or setting up any crypto trading bot:
- [ ] API keys created with trade-only permissions (no withdrawals)
- [ ] IP whitelisting enabled on exchange API keys
- [ ] Separate API keys for each service (no reuse)
- [ ] Platform's API key storage model understood (custodial vs. signal-push)
- [ ] Platform's breach history reviewed
- [ ] Test account with limited funds used for initial setup
- [ ] Backtest strategy validated before live deployment
- [ ] Stop-loss and maximum drawdown limits configured
- [ ] API key rotation schedule set (every 90 days)
- [ ] Emergency plan documented (what to do if breach suspected)
Frequently Asked Questions
Can someone steal my crypto with just an API key?
If your API key has withdrawal permissions enabled, yes, they can withdraw your funds directly. Even without withdrawal permissions, an attacker with trade access can damage your account by executing bad trades, such as buying illiquid tokens at inflated prices to benefit their own positions. Always disable withdrawal permissions on bot API keys.
Is encryption enough to protect my API keys?
Encryption is necessary but not sufficient. Encrypted keys must be decrypted to be used, creating a window of vulnerability. The 3Commas breach demonstrated that even encrypted keys can be exposed. The only way to fully eliminate this risk is to use a zero-knowledge architecture where the platform never possesses your keys.
What should I do if I suspect my API keys are compromised?
Immediately: (1) Delete the API keys on your exchange, (2) Cancel all open orders, (3) Review recent trade history for unauthorized activity, (4) Create new API keys with fresh permissions, (5) Report to the exchange and the bot platform. Speed matters; do not wait to confirm the breach before acting.
Are hardware wallets relevant for bot trading?
Hardware wallets protect the assets in your wallet but do not protect your exchange account. Bot trading happens on centralized exchanges, and the API keys that control your exchange account are separate from your hardware wallet. Both are important: use hardware wallets for long-term storage and proper API key security for exchange-based trading.
Protect Your Trading Capital
Security is not a feature. It is the foundation everything else depends on. A bot with a 50% annual return is worthless if a platform breach wipes out your account. The API key storage architecture of your trading platform is the most consequential decision you will make, more important than strategy selection, exchange choice, or pricing.
Sentinel Bot's signal-push architecture ensures your credentials never leave your device. No centralized key database means no centralized breach target. Start your free trial and experience zero-knowledge trading security firsthand.
Disclaimer: Cryptocurrency trading carries significant risk. Past performance is not indicative of future results. Never trade with money you cannot afford to lose. This article is for educational purposes only and does not constitute financial advice.