Security
📄️ Smart Contract Authorization
Smart contract authorization
📄️ Signatures and Multisig
This section details signing non-smart contract transactions. For auth related to smart contract transactions, see authorization
📄️ Securing Web-Based Projects
Any application managing cryptocurrency is a frequent target of malicious actors and needs to follow security best practices. The below checklist offers guidance on the most common vulnerabilities. However, even if you follow every piece of advice, security is not guaranteed. Web security and malicious actors are constantly evolving, so it’s good to maintain a healthy amount of paranoia.