Docs Category: Security

Ensure it is the User (1yⓃ)

To Share and +4 nLEARNs Login with NEARNEAR uses a system of Access Keys to simplify handling accounts. There are basically two type of keys: Full Access, that have full control over an account (i.e. can perform all actions), and Function Call, that only have permission to call a specified smart contract’s method(s) that do …

Ensure it is the User (1yⓃ) Read More »

Front Running

To Share and +4 nLEARNs Login with NEARIn the NEAR network, validators have access to the transaction pool, and can therefore see them before they execute. This enables validators to analyze transactions for a potential profit and frontrun them with a transaction of their one. For example, imagine that you make a game where users …

Front Running Read More »

✅ Checklist

To Share and +4 nLEARNs Login with NEAROnce you finished developing your smart contract please go through the following list in order to ensure everything is safe for the end user. Anatomy There are no private methods marked as public by mistake Environment predecessor and signer are used correctly through the entire contract Storage Each …

✅ Checklist Read More »

Cross-Contract Calls

To Share and +4 nLEARNs Login with NEARWhile writing cross-contract calls there is a significant aspect to keep in mind: all the calls are independent and asynchronous. In other words: The method in which you make the call and method for the callback are independent. Between the call and the callback, people could interact with …

Cross-Contract Calls Read More »

Scroll to Top
Report a bug👀