Content
@
https://warpcast.com/~/channel/embeddedwallets
0 reply
0 recast
0 reaction
Colfax
@colfax
1/ Defense in depth: transaction policies Even in the event of an infrastructure takeover, policies can keep your funds safe. We believe that robust security comes in layers that can be resilient against many flavors and angles of attack. Here’s our latest thinking at @privy 👇 https://privy.io/blog/policy-engine
2 replies
7 recasts
18 reactions
Colfax
@colfax
2/ Most hacks are the result of a compromised wallet taking an action that it doesn’t normally perform. Simply, with policies, if a transaction doesn’t match what you expect, even if it comes from your infrastructure, it won’t go through. Some examples are: 🔺 Max transaction value 🚦 Allowlist to certain addresses ❌ Restrict smart contract parameter values 💻 Prevent use of 'delegatecall' They can also be stacked together
1 reply
0 recast
1 reaction
zetosan
@zetosan
Crypto’s chaos, but I’m here for it
0 reply
0 recast
0 reaction