Compliance-Gated Wallet + KRC-20 Tools

Token Depot is a private beta environment for KRC-20 Issue-Mode tools and compliance-gated workflows on Kaspa. Access requires an approved account.

What you can do

  • Wallet + offers + swaps (Mainnet & Testnet)
  • Deploy / Issue / Wrap / Redeem / Energy (Testnet-10 without license)

How access works

  • Approved accounts only
  • Request Access collects contact info for review
  • No KYC at request-time

Requests are reviewed manually. Automated provisioning + notifications will be implemented next.

Token_Depot is your dedicated console for KRC-20 Issue-Mode tokens on Kaspa. It sits between you and the blockchain, helping you assemble clean deploy and issue actions while leaving full control of your offline keys and signatures.

Use this page when you want a transparent, JSON-first workflow: fill in the fields, review the JSON preview, then confirm. Token_Depot never holds your funds or seed phrase; it only prepares the data that your wallet signs.

Before you start

  • When you’re experimenting or proving out a new token design, start on testnet-10 or then switch to mainnet only when you’re ready for a permanent CA.
  • Keep a small KAS buffer above the minimums shown in the Deploy and Issue sections so reveal fees have room to succeed and your transactions don’t fail due to tight balances.

Everything you need to run Issue-Mode on Kaspa

Pick a workflow below. Each page keeps the same pattern: fill the fields → review the JSON → sign commit + reveal. Token_Depot prepares data; your wallet signs; the chain records the truth.

Deploy — Regular KRC-20

Create a brand-new Issue-Mode CA for a standard KRC-20 token. Ideal for new launches, experiments, and permanent mainnet CAs.

  • Supply cap, decimals, optional premint
  • Preview commit/reveal JSON before signing
  • Testnet first, mainnet when ready

Open Deploy →

Deploy — Wrapped Asset Token

Deploy a KRC-20 wrapper (TDUSDC, TDUSDT, TDPYUS, TDETH, TDBTC…) backed by an external vault address.

  • Mainnet vault (required) + testnet vault (optional)
  • Admin token gates mainnet deploy
  • Designed for clean 1:1 issuance workflows

Open Deploy →

Issue — Regular KRC-20

Mint/issue tokens to an address using the standard Issue-Mode flow. Best for scheduled emissions, distributions, and treasury ops.

  • One form → commit + reveal in your wallet
  • Clear, JSON-first audit trail
  • Built for repeatable operations

Open Issue →

Issue — Wrapped (Vault-Backed)

Issue wrapped tokens only when a matching vault deposit is detected. The UI helps you line up the deposit and the issuance.

  • Monitors vault deposits and confirms the matching op
  • Supports EVM mainnet + Sepolia (when funded)
  • Stops “looks right” mistakes with field checks

Open Wrap →

Wrap — EVM/BTC → KRC-20

Deposit to a vault, monitor the chain, then issue the matching wrapped KRC-20 token to a Kaspa address.

  • Pick asset + network, start monitor
  • Uses per-network RPC config to read holdings
  • Shows “Controlled Wrapped Assets” for clarity

Open Wrap →

Redeem — KRC-20 → EVM/BTC

Burn or redeem wrapped tokens and receive the underlying asset from the vault. The UI tracks the redemption request and status.

  • Burn → monitor → redeem
  • Manual redemption SLA text is configurable
  • Designed to be demo-friendly and auditable

Open Redeem →

Vaults & Networks — Mainnet vs Testnet

Configure vault addresses, verify holdings, and confirm which network you are operating on before you deploy, wrap, or redeem.

  • Mainnet vaults for real assets
  • Testnet vaults for rehearsal (Sepolia/Testnet-10)
  • Net column + holdings help prevent wrong-chain errors

Open Settings →

Safety & Transparency

Token_Depot never takes custody. It’s a precision UI for building clean transactions and verifying outcomes across chains.

  • Keys stay in your offline memory device
  • Every action is previewable JSON
  • Designed for controlled swaps and repeatability

This page has been viewed times.