@@ -46,11 +46,37 @@ your project requirements and find out which Web3Auth product is the best fit fo
4646| ** Out-of-box Authentication** | ✅ | ❌ | ❌ |
4747| ** Custom Auth Provider Support** | ✅ | ✅ | ✅ |
4848| ** Bring your own Auth** | ✅ | ✅ | ✅ |
49- | ** Wallet management Algorithm** | Shamir's Secret Sharing | Shamir's Secret Sharing | Theshold Signature Scheme |
50- | ** Import Private Key** | ❌ | ❌ | ✅ |
49+ | ** Wallet management Algorithm** | Shamir's Secret Sharing | Shamir's Secret Sharing | Threshold Signature Scheme |
50+ | ** Import Private Key** | ❌ | ❌ | ✅ \* |
5151| ** Export Private Key** | ✅ | ✅ | ✅ |
5252| ** External Wallet Support** | ✅ | ❌ | ❌ |
5353
54+ <details >
55+
56+ <summary >
57+ <b >* Import Private Key in MPC Core Kit</b >
58+ </summary >
59+
60+ <div >
61+ We do not encourage the use of the import flow due to the associated security risks. As a
62+ non-custodial solution leveraging MPC (Multi-Party Computation) for key generation, maintaining
63+ the highest level of key security is a core principle. The import flow introduces uncertainty
64+ regarding the origin and custody of the private key, potentially exposing it to unauthorized
65+ access and undermining the security guarantees of our system.
66+ </div >
67+
68+ <br />
69+
70+ <div >
71+ However, if the import private key flow is deemed essential for your dApp, it is crucial to ensure
72+ thorough user education around the associated security risks. Users must be made aware that
73+ importing a key— especially from an unknown or potentially compromised source—can expose them to
74+ significant vulnerabilities, as it falls outside the secure key generation and management process
75+ provided by our MPC-based, non-custodial architecture.
76+ </div >
77+
78+ </details >
79+
5480### Platform Support
5581
5682| Platform | Plug and Play | Single Factor Auth | MPC Core Kit |
0 commit comments