Security Best Practices
A series of guides and documentation to help developers build safe and secure products on Stellar.
🗃️ Threat Modeling
4 items
📄️ Securing Web-Based Projects
Any application managing cryptocurrency is a frequent target of malicious actors and needs to follow security best practices. The below checklist offers guidance on the most common vulnerabilities. However, even if you follow every piece of advice, security is not guaranteed. Web security and malicious actors are constantly evolving, so it’s good to maintain a healthy amount of paranoia.