Skip to content

Contract Security Guidelines ​

This page will cover security concerns and mitigations for contract design:

  • Input validation and sanitization
  • Authentication and authorization considerations
  • Privacy-preserving fields and redaction
  • Threat modeling and abuse prevention
  • Logging, telemetry, and PII handling

Status: draft. Contributions welcome.