Docs Category: Security

Random Numbers

To Share and +4 nLEARNs Login with NEARWhen writing smart contracts in NEAR you have access to a random seed that enables you to create random numbers/strings within your contract. This random seed is deterministic and verifiable: it comes from the validator that produced the block signing the previous block-hash with their private key. The …

Random Numbers Read More »

Sybil Attacks

To Share and +4 nLEARNs Login with NEARWhile developing your smart contract, keep in mind that an individual can potentially create multiple NEAR accounts. This is especially relevant in ecosystems involving crowd decisions, such as DAOs. Imagine that you open the voting to anyone in the community. If each account can cast a vote, a …

Sybil Attacks Read More »

Million Small Deposits

To Share and +4 nLEARNs Login with NEAROn NEAR, your contract pays for the storage it uses. This means that the more data you store, the more balance you need to cover for storage. If you don’t handle these costs correctly (e.g. asking the user to cover their storage usage), then a million little deposits …

Million Small Deposits Read More »

Ensure it is the User (1yⓃ)

To Share and +4 nLEARNs Login with NEARNEAR uses a system of Access Keys to simplify handling accounts. There are basically two type of keys: Full Access, that have full control over an account (i.e. can perform all actions), and Function Call, that only have permission to call a specified smart contract’s method(s) that do …

Ensure it is the User (1yⓃ) Read More »

Front Running

To Share and +4 nLEARNs Login with NEARIn the NEAR network, validators have access to the transaction pool, and can therefore see them before they execute. This enables validators to analyze transactions for a potential profit and frontrun them with a transaction of their one. For example, imagine that you make a game where users …

Front Running Read More »

Scroll to Top