This offline terminal app recovers the private keys of vaults by combining the shares of each io.finnet app backup file.
It exports a WIF for Bitcoin key import to Electrum and will also create a wallet V3 file for importing to MetaMask, Phantom and other Ethereum wallets.
For other coins and wallets, please see the specific recovery information below or on our guides page. You may be required to run another script located in the scripts area of this repository.
Important
This app does not do ANY communication with any external host or service. It does not need an Internet connection at all.
It is recommended that you run it on a non internet connected ("air gapped") device such as a laptop not connected to any network.
The browser UI and transaction tools are designed with a security-first approach:
- All processing happens locally in your browser or terminal
- Command-line scripts run transaction operations offline
- Balance checking can be done using only public addresses
- Two-step transaction process allows you to disconnect from the internet before executing transactions
You can build the code from source. Clone the repo, and make sure the latest Go is installed.
Compile from source:
make
Compile individually for Windows, Mac (Apple Silicon), Linux (x86-64 or ARM64), or FreeBSD (x86-64 or ARM64):
make build-win
make build-mac
make build-linux-amd64 # for x86-64 Linux
make build-linux-arm64 # for ARM64 Linux
make build-linux # builds both Linux variants
make build-freebsd-amd64 # for x86-64 FreeBSD
make build-freebsd-arm64 # for ARM64 FreeBSD
make build-freebsd # builds both FreeBSD variants
The resulting executable(s) will be in the bin/
folder. Windows may display a security warning when running the executable.
If you prefer the convenience of downloading a pre-built binary for your platform, head to the Releases area. We have pre-built binaries for:
- Linux: x86-64 (amd64) and ARM64 (aarch64)
- FreeBSD: x86-64 (amd64) and ARM64 (aarch64)
- Windows: x86-64 (amd64)
- Mac: ARM64 (Apple Silicon)
All binaries are compressed in versioned .tar.gz
archives with maximum compression to reduce download size (approximately 50% smaller). The binaries in these archives already have executable permissions set, so no additional chmod
commands are needed after extraction.
After downloading, extract the binary with:
tar -xzf recovery-tool-*.tar.gz
Note
On Windows, you should run tar from Command Prompt.
There are some extra steps to acknowledge security warnings depending on your platform:
Run the following command before you run the tool to remove quarantine attributes:
xattr -dr com.apple.quarantine recovery-tool*
Windows may display a security warning too. Just select "Run anyway" to run it when you see this popup at the next step.
You could also do this another way by:
- Right-clicking the file
- Selecting Properties
- At the bottom of the General tab, looking for a "Security" section with "This file came from another computer" message
- Checking "Unblock" and clicking OK
Alternatively, you may run this command in PowerShell to unblock the file.
Unblock-File -Path "recovery-tool.exe"
Run the recovery tool with your backup JSON files or ZIP archives containing JSON files.
./recovery-tool-mac sandbox/file1.json sandbox/file2.json
You can also use ZIP archives that contain multiple JSON files:
./recovery-tool-mac sandbox/backup.zip
Note
When using ZIP files, ensure they contain only a flat hierarchy of JSON files with no nested directories. Each ZIP file will be treated as a batch of JSON files, all using the same mnemonic phrase.
You can also provide the vault ID you want to recover, which will skip the step of choosing a vault:
./recovery-tool-mac -vault-id cl347wz8w00006sx3f1g23p4s sandbox/file1.json sandbox/file2.json
Use multiple ZIP archives:
./recovery-tool-mac sandbox/backups1.zip sandbox/backups2.zip sandbox/backups3.zip
Note: You cannot mix JSON and ZIP files in the same command.
Replace mac
with one of the following depending on your computer's OS and architecture:
linux-amd64
- For Linux on x86-64 processorslinux-arm64
- For Linux on ARM64 processors (e.g., Raspberry Pi 4, AWS Graviton)freebsd-amd64
- For FreeBSD on x86-64 processorsfreebsd-arm64
- For FreeBSD on ARM64 processors.exe
- For Windows (just userecovery-tool.exe
)
Note
The tool will try to auto-detect the optimal "reshare nonce" and "threshold/quroum" of the vault you are trying to recover.
However, if you would like to override this behavior, you may specify custom values with -nonce
and -threshold
flags respectively.
The recovery tool includes a browser UI that provides a more user-friendly way to work with your recovered keys and blockchain assets. The browser UI runs locally in your browser and requires no internet connection.
To use the browser UI, run the recovery tool and navigate to the provided local URL (typically http://localhost:8080):
$ ./bin/recovery-tool -web
Starting http server on http://localhost:8080
The browser UI provides:
- Step-by-step instructions for vault recovery
- Balance checking functionality for XRP, Solana, and Bittensor networks
- Command generation for secure transactions
- Address validation and key management
The tool is able to export a wallet v3 JSON file for import into MetaMask. Set the -password
flag on the command line to export the wallet.json
, and make sure it's saved somewhere safe.
To import it, open your MetaMask and add an account, then choose the import from file option.
The tool exports two WIFs for import into the Electrum Bitcoin wallet: one for mainnet (bc1
address), and another for testnet (tb1
address).
Choose the one depending on your vault's environment.
A WIF looks like: L1CujRNEhNfZgTS9b6e3hytTDu7gpUv1kiLx4ETEEhEc8nJcx4QA
You may download Electrum wallet, and follow these steps to import a WIF:
Important
If you intend to recover a testnet key (address with tb1
prefix), you must run Electrum with the --testnet
flag from your Terminal:
On a Mac, this is done as follows:
open -n /Applications/Electrum.app --args --testnet
Prefix the WIF string with with p2wpkh:
, then paste it into the box.
Create a password for the wallet.
After syncing up the chain (may take a while), Electrum should show your balances, and the private key is recovered.
Please use TronLink to recover Tron and Tron assets. Follow this guide and import your vault's private key output by the tool.
Some other chains require the use of a node.js script which we have included.
We use a specific key format for XRPL. You can use the browser UI to generate the appropriate commands, or directly use the XRPL tool:
# Check balance
cd scripts/xrpl-tool && npm install
npm start -- --address rXXXYourAddressXXX --check-balance --network mainnet
# Create transaction
npm start -- --private-key YourPrivateKey --public-key YourPublicKey --destination rXXX... --amount 10 --network mainnet
For Bittensor, the browser UI will provide commands, or you can use the Bittensor tool directly:
# Check balance
cd scripts/bittensor-tool && npm install
npm start -- --address XXXYourAddressXXX --check-balance --network mainnet
# Create transaction
npm start -- --private-key YourPrivateKey --destination XXX... --amount 10 --network mainnet
For Solana (SOL) recovery and transactions:
# Check balance
cd scripts/solana-tool && npm install
npm start -- --address XXXYourAddressXXX --check-balance --network mainnet
# Create transaction
npm start -- --private-key YourPrivateKey --destination XXX... --amount 10 --network mainnet
Use the EdDSA key output for these chains that use EdDSA (Edwards / Ed25519) keys.