XRPL Custody Deep-Dive
The ten custody methods on XRPL, what regulators call each one, and how to design an architecture that survives review.
Custodial
CASP Art. 75 mandatory- Single KeyMaster key held by service
- IOU / Trust LinesGateway holds off-chain assets
Grey zone
Legal opinion required- Regular KeySecondary key; master behavior matters
- SignerList (majority)Service reaches quorum alone
- MPC / TSSThreshold signatures, app-layer
- MPT (XLS-33)Programmable, issuer flags
Non-custodial
No CASP for the custody itself- EscrowTime-locked / conditional
- Payment ChannelsOff-ledger settlement
- ChecksOn-ledger deferred payment
- NFT Broker modeAtomic XLS-20 swap
- SignerList (minority)Service cannot sign alone
Why custody is the regulatory crux
Of all the services in crypto, custody is where regulators apply the heaviest hand. The reason is simple: custody is the entry point for client fund loss, fraud, and AML abuse. A failed exchange can be ring-fenced; a failed custodian takes clients' assets with it.
Under MiCA, custody (Art. 75) requires the highest capital requirement of all CASP services (β¬350K) plus strict safekeeping, segregation, and insurance obligations. Under FinCEN, custody triggers MSB registration and often state money-transmitter licences. Under Hong Kong's SFC VASP regime, custody must be >98% cold storage.
The question of whether your service is "custodial" therefore determines whether you need a heavy licence or a light one β or none at all. XRPL gives you unusual flexibility: the protocol supports multiple custody patterns natively, and the classification of each pattern differs.
The key distinction
Custodial
A third party holds the keys that sign transactions on the user's behalf. The user trusts the third party. If that party disappears, so do the assets. All centralized exchange hot wallets are custodial. Gateway-issued IOUs are custodial.
Non-custodial
The user controls their own keys. No third party can move the funds without the user's signature. Hardware wallets are non-custodial. Escrows locked to time or cryptographic conditions are non-custodial β even a smart-contract-less ledger like XRPL enforces release at the protocol level.
Grey zone
Where signing authority is split or shared β multi-sig, MPC, regular-key-plus-master-key setups β regulators have not issued clear guidance. The classification typically hinges on: can any single party act alone? If yes, that party is the custodian. If no, the setup leans non-custodial.
Grey zone means regulators have not said definitively. It does not mean you escape scrutiny. ESMA, FCA, BaFin and NYDFS are all expected to issue guidance over 2026-2027. Assume your grey-zone classification can tighten.
The 10 XRPL methods
XRPL offers ten distinct ways to structure who can sign. Three are clearly custodial, four are clearly non-custodial, three live in the grey zone.
Clearly custodial
- Single Key β service holds the master key of the user's XRPL account. Full control. This is the default model for centralized exchanges.
- IOU / Trust Lines (gateway model) β service issues tokens backed by off-chain reserves, users hold claims. RLUSD follows this pattern. Triggers both custody AND issuer rules.
Clearly non-custodial
- Escrow β XRP locked by time or cryptographic condition. Ledger enforces release. No third party needed.
- Payment Channels β depositor locks XRP on-chain, receiver collects off-chain signed claims. Channel close is protocol-enforced.
- Checks β on-ledger "cheque" where the sender's account is debited only when the receiver cashes.
- NFT Broker mode (XLS-20) β atomic swap of buy and sell offers. Broker never touches the NFT.
- SignerList minority β multi-sig where service holds fewer keys than quorum requires. Cannot act alone.
Grey zone
- Regular Key β secondary key assigned via SetRegularKey. If master stays active with the user, classification depends on use; if master is disabled, service is custodial.
- SignerList majority β multi-sig where service holds enough weight to reach quorum alone. Usually custodial; some argue otherwise if operational policies require user co-signing.
- MPC / TSS β threshold signatures implemented at application layer. Key never exists in full. Strong technical non-custodial argument; ESMA and FCA have not ruled.
- MPT (XLS-33) β programmable tokens. The issuer can lock (lsfLocked) or require authorization (lsfRequireAuth). Depending on use, can be treated like IOU (custodial) or like Other crypto-asset.
Designing your architecture for compliance
A defensive architecture starts from the regulatory outcome you want and works backward to the XRPL primitives. Three common target profiles:
1. Institutional custody β you WANT to be custodial
Embrace the Art. 75 CASP / MSB obligations and structure for institutional credibility. Use MPC or SignerList majority with formal multi-party signing workflows. Cold storage >98% for retail jurisdictions. Segregate client accounts at the XRPL account level (one account per client, not pooled wallets). The path is expensive but credible.
2. Self-custody infrastructure β you do NOT want to hold keys
Deliver software or services that help users custody their own XRPL assets. Use SignerList minority (service is 1-of-3, user holds 2). Combine with Regular Key where the user always retains the master. The user is the sole party that can reach quorum. You escape CASP but become a software provider.
3. Payment rails β protocol primitives
For payment, streaming, or escrow-like use cases, rely on Escrow, Payment Channels, and Checks. These are protocol-enforced and sidestep custody entirely. Your CASP exposure shifts to "transfer services" (Art. 82, β¬50K capital) which is lighter than custody.
Case study: RLUSD and the IOU gateway
Ripple's RLUSD stablecoin is the reference implementation of a compliant IOU gateway on XRPL. Standard Custody & Trust Company (NYDFS-chartered) issues RLUSD through an XRPL trust line. Users hold RLUSD balances as on-chain claims against the trust.
Key design choices:
- RequireAuth flag on the issuer account β holders must be explicitly authorized by the issuer. On-chain KYC gating.
- freeze flag β the trust can freeze individual trust lines for AML holds.
- globalFreeze flag β emergency brake freezing all trust lines.
- 1:1 backing in cash deposits + short-term US Treasuries, segregated from Ripple's own funds.
- Separate mints on XRPL and Ethereum β no bridge, each chain is an independent issuance.
The model shows that "custodial" doesn't mean "old-school centralized". A well-designed IOU gateway gives you the legal clarity of a traditional bank custody with on-chain compliance primitives that ERC-20 stablecoins have to retrofit through admin functions.
Use the "Is my XRPL custody custodial?" diagnostic to route your own architecture through the 10 methods and get a verdict.
Explore further
Related terms
General information only. Not legal advice. For your specific situation, consult a qualified lawyer.