Named Lists

Named lists are reusable collections of addresses or values used in policy rules. They simplify policy management by centralizing allowlists, blocklists, and other collections.

What is a Named List?

A named list is a collection of values that can be referenced by policies:

  • Centralized Management — Update once, apply everywhere
  • Policy Reuse — Reference lists in multiple policies
  • Easy Auditing — Track list membership changes
  • Dynamic Updates — Modify lists without changing policies

List Types

TypeDescriptionExample Use
ADDRESSBlockchain addresses (0x...)Allowlisted recipients, blocked addresses

How Lists Work with Policies

Named lists are referenced in policy conditions using the IN_LIST and NOT_IN_LIST operators:

Common Use Cases

Counterparty Allowlist

Maintain a list of verified business partners and exchanges:

List NameTypePurpose
approved-counterpartiesADDRESSKYC-verified recipient addresses

Policy usage: Block transfers to addresses NOT in this list.

Sanctions Blocklist

Block known sanctioned or high-risk addresses:

List NameTypePurpose
sanctioned-addressesADDRESSOFAC and other sanctioned addresses

Policy usage: Block transfers to addresses IN this list.

Internal Vaults

Track your organization's vault addresses:

List NameTypePurpose
internal-vaultsADDRESSAll vault addresses owned by organization

Policy usage: Allow transfers between internal vaults without approval.

Policy usage: Block transactions to chains NOT in this list.

List Membership Checking

Before submitting a transaction, you can verify if an address is in a list:

This enables:

  • Pre-flight validation before transaction submission
  • User feedback ("This recipient is not on your allowlist")
  • Conditional UI flows

Best Practices

Naming Conventions

Use clear, descriptive names:

GoodBad
approved-counterparties-productionlist1
ofac-sanctioned-addressesblocklist
internal-treasury-vaultsvaults

Organization

PracticeDescription
Separate by purposeDifferent lists for allowlists, blocklists, internal addresses
Include descriptionsDocument the list's purpose and update criteria
Use consistent formattingLowercase addresses, consistent naming conventions

Maintenance

PracticeDescription
Regular auditsReview list contents periodically
Document changesTrack who added/removed items and why
Version controlConsider exporting lists for backup
Automate updatesUse API for dynamic list management

Security

PracticeDescription
Verify before addingConfirm addresses before adding to allowlists
Monitor blocklistsKeep sanctioned address lists current
Limit accessControl who can modify critical lists
Audit trailReview list modification logs

Integration Patterns

Automated Allowlist Sync

Sync your allowlist with an external KYC system:

API Reference

For complete API documentation including endpoints, request/response examples, and code samples: