Security
Best practices and tools for protecting digital assets and private keys.
Start here
Cold Storage
A method of storing cryptocurrency private keys completely offline, isolated from internet-connected devices, providing maximum security against online threats and hacks.
Double Spending
The act of spending the same cryptocurrency twice by exploiting timing or consensus vulnerabilities, prevented by blockchain consensus mechanisms ensuring transaction finality.
MetaMask
The most popular browser extension and mobile wallet for interacting with Ethereum and EVM-compatible blockchains. Gateway to Web3 applications and DeFi protocols.
Private Key
A secret cryptographic key that proves ownership of a blockchain address and authorizes transactions, functioning as the master password to your cryptocurrency.
Rug Pull
A rug pull is a type of scam where cryptocurrency project developers abandon the project and run away with investors' funds, often by removing liquidity or exploiting backdoors in smart contracts.
Seed Phrase
A 12 or 24-word phrase that serves as the master key to your cryptocurrency wallet. Anyone with your seed phrase can access all your funds.
Wallet
A software or hardware tool that stores cryptographic keys enabling users to send, receive, and manage cryptocurrency and interact with blockchain applications.
Build your knowledge
Audit
A smart contract audit is a comprehensive security review of blockchain code by specialized firms to identify vulnerabilities, bugs, and potential exploits before deployment to mainnet.
Circuit Breaker
A security mechanism in smart contracts that temporarily stops operations when predefined risk thresholds are breached, preventing cascading failures during market stress.
Exploit
An exploit is an attack that takes advantage of vulnerabilities in smart contracts or blockchain systems to steal funds, manipulate outcomes, or disrupt protocol functionality.
Multi-Signature Wallet
A cryptocurrency wallet that requires multiple private keys from different parties to authorize transactions, distributing control and preventing single-point-of-failure security breaches.
Multisig
A multi-signature wallet that requires multiple private keys to authorize a transaction, providing enhanced security and shared control over cryptocurrency funds.
Sandwich Attack
An MEV exploit where an attacker observes pending transactions and strategically places their own transactions before and after to profit from price movements.
Slashing
A penalty mechanism in Proof of Stake networks that destroys part of a validator's staked cryptocurrency for malicious behavior or rule violations, protecting protocol security.
Expert level
Oracle Attack
An exploit targeting oracle vulnerabilities to manipulate price feeds or external data, enabling attackers to trigger liquidations or drain smart contracts.
Reentrancy
A smart contract vulnerability where a function can be called recursively before internal state is updated, allowing attackers to drain funds through repeated calls.