📈
Gemach DAO
  • 📈What is Gemach?
    • 🧑‍🚀Our Mission
    • 👁️Our Vision
    • ⚖️Our Values
    • 🛣️Our Roadmap
    • 👥Our Contributors
  • Products
    • 🪬Gbot Web Dash
      • Introduction
      • Getting Started with GDex.Pro
      • Features
        • Discovery Feature
        • Portfolio Management
        • Meme Scope Feature
        • Bubble Maps Visualization
        • Bridge Functionality
        • Copy-Trading
      • Integrations
        • Apple-Pay Integration
        • Web3Auth Integration
      • Help and Support
        • Troubleshooting
        • FAQ
    • ⛓️Gemach AI
      • Introduction
      • Getting Started
      • Executing DeFi Actions
      • Using the Chat Interface
      • Managing Your Portfolio
      • Security Best Practices
      • Troubleshooting
      • FAQ
    • 🤖GBot
      • Guides
        • Guide: Trading on Solana
        • Guide: Trading on EVM-Based Chains via Telegram
    • 🧮GLend
      • ⏩Supply
      • ◀️Borrow
      • 💥Liquidation
      • 🔬Audits
      • 📜Contract Addresses
    • 🔓GVault
    • 📊GFund
    • 💸GLoans
    • 📟GScanner
    • 📑Alpha Intelligence Guide
  • Ecosystem Tokens
    • 🦁GMAC
    • 🪙GLEND
  • Miscellaneous
    • 📒Beginner's Guide (to Arbitrum)
      • 📝Wallet Creation
      • 🛠️Wallet Setup for Arbitrum Compatibility
      • 🌉Bridging Tokens to Arbitrum
      • 🗃️Adding Tokens to the Wallet Interface
    • 🔐General Security Notes
    • ⭐Brand Assets
    • 🔗Links
Powered by GitBook
On this page
  1. Miscellaneous

General Security Notes

PreviousAdding Tokens to the Wallet InterfaceNextBrand Assets

Last updated 1 year ago

A few general points to note when interacting with blockchain applications:

  • Caution should be exercised when interacting with any smart contract or blockchain application

  • While risks are attempted to be mitigated through testing, audits and bug bounties, there is always a risk of vulnerabilities in smart contract code

  • and scams are common whether related to blockchains or not

  • Blockchain related phishing scams can involve tricking a user to reveal their private keys, seed phrases, other sensitive information or tricking a user to sign malicious transactions

  • It may be prudent to maintain two separate wallets, one wallet to store the majority of holdings and funds, and another wallet to use when interacting with new websites

  • When interacting with new websites and signing transactions in your wallet it is important to check the contract being interacted with as well as the operation being signed, most wallets will display the name of the operation to be signed

🔐
Phishing