Trezor Suite® – Getting Started™ Developer Portal
A practical, developer-focused walkthrough for integrating with Trezor Suite: architecture, tools, APIs, example flows, and best practices to ship secure apps.
Overview
Trezor Suite is the secure, user-facing application that talks to Trezor hardware devices. The Developer Portal centralizes the tools, SDKs, and references you need to integrate WalletConnect flows, Trezor Connect interactions, and deeper Suite integrations. Whether you're building a third-party wallet, a merchant checkout, or an internal tooling integration, this guide shows the fastest, safest path.
Why build against Trezor Suite?
Trezor focuses on clear separation of duties: the hardware device holds secrets and signs; Suite orchestrates accounts, UI, and networking. By integrating at the Suite/Connect layer you gain verified signing flows, standard UX patterns, and the safety guarantees that come from the hardware-backed cryptography.
What you'll find in this portal
- Official SDKs & packages for web, desktop, and mobile.
- API references for Trezor Connect and Suite internals.
- Security notes and reproducible-build guidance.
- Example code and step-by-step integration flows.
Quick start (developer path)
This is the minimal path to get an integration working locally:
1 — Install and run Trezor Suite
Download the desktop/web Suite so you can test interactions with a connected device. The Suite exposes the integration surfaces (Connect, new pop-up flows, WalletConnect) you will exercise during development.
2 — Pick the right SDK
For web integrations the trezor-connect JS library is the recommended start. If you are building an embedded backend or running node tooling, consult Suite's monorepo for packages and examples.
3 — Follow secure signing flows
Always implement the user confirmation flow: transactions are constructed server-side (or in the client) but the final signing step must be shown to the user on device. Avoid remote signing or storing private keys anywhere outside the hardware device.
Minimal code snippet (connect)
// Example: connect using trezor-connect (pseudo)
TrezorConnect.getPublicKey({ path: "m/44'/0'/0'/0" })
.then(response => {
if (response.success) console.log(response.payload);
else console.error(response.payload.error);
});
Architecture & integration patterns
Trezor Suite exposes several common integration surfaces. Choose one based on your product:
Embed with Connect (recommended for most web apps)
Use the Connect APIs to request public keys, ask for signatures, and authenticate users. Connect takes care of transport (popup / iframe / suite), serialization, and versioning.
Suite-native integrations
If you're building deeply integrated features—like custom backends, in-Suite plugins, or contributions to the Suite codebase—clone the Suite monorepo and explore package READMEs and examples.
Custom backends
Run your own Blockbook or indexing backend to keep full privacy and control of how blockchain data is queried and stored. Suite can be configured to point to custom backends for maximum user privacy.
Developer resources (official links)
Below are the canonical, official resources you should bookmark. Each link opens the official Trezor pages and developer repositories.
Tip: star the monorepo and watch releases on GitHub to follow API/behavior changes and release notes.
Testing & CI tips
Automated tests, reproducible builds, and a deterministic firmware build process are core to Trezor's security posture. If you plan to customize Suite or firmware, use the official reproducible build guides, CI settings, and Docker-based build containers published in the firmware docs and monorepos.
Local dev flow
- Clone the trezor-suite monorepo and install dependencies.
- Run the dev server and point Suite at a test Blockbook instance (or the official testnet endpoints).
- Use a hardware device on a testnet or an emulator when experimenting with signing flows.
Useful command examples
# clone repo
git clone https://github.com/trezor/trezor-suite.git
cd trezor-suite
# follow monorepo README for setup (node version, yarn install, etc.)
Best practices & pitfalls
Keep these pragmatic recommendations in mind while building:
Security
Never ask users to expose their seed phrase. Always route signing to the device. Verify all UX flows so the user can clearly see the amount, destination, and fee parameters on device before confirming.
UX
Follow the standard Connect flows so users see familiar popups/notifications. Avoid hidden approvals, and always provide clear error handling for disconnected devices or canceled signatures.
Maintenance
Pin supported SDK versions and monitor releases. Trezor occasionally updates Connect flows and may deprecate old endpoints—subscribe to release notes and GitHub releases to keep integrations healthy.