Skip to content

Latest commit

 

History

History
53 lines (33 loc) · 2.87 KB

File metadata and controls

53 lines (33 loc) · 2.87 KB
layout title tags level type pitch
col-sidebar
OWASP BlockChain AppSec Security Standard
blockchain data datasecurity security top10 data-security blockchain-security web3-security blockchain-data-security roadmap news acknowledgments
4
documentation
The guide focuses on blockchain, decentralized applications (D-Apps), NFTs, cryptocurrency, and related infrastructure providing best practices, known risks and mitigations and other information related to the unique challenges of understanding blockchain.

Overview

The guide focuses on blockchain, decentralized applications (D-Apps), NFTs, cryptocurrency, and related infrastructure providing best practices, known risks and mitigations and other information related to the unique challenges of understanding blockchain.

Getting Involved

You do not have to be a security expert or a programmer to contribute. Contact the project leader(s) to get involved. We welcome any suggestions and comments. Possible ways to contribute:

  • We are actively looking for organizations and individuals who understand blockchain security challenges.
  • Individuals and organizations contributing to the project will be listed on the acknowledgments page.

Blockchain vs Web3

Blockchain is the technological backbone of Web3 and as a fundamental technology, like a database, allows for new types of systems in Web3. Web3, built from blockchain, is a tokenization system that is unique to the owner that can provide absolute, transparent authority.

An example of such a system in Web3, built from the foundation of blockchain is as follows:

A user logs in to a website for the first time using their on-chain wallet address with a single signature passwords, user accounts, all new interaction on the web. The worst thing to ever happen to blockchain is cryptocurrency.

Non-fungible Tokens (NFTS)

  • [DATA1:2023 - Injection Attacks][DATA1:2023]

    Unauthorized individuals exploiting vulnerabilities to inject malicious code or commands that can compromise data integrity and confidentiality. [Continue reading][DATA1:2023].

Wallets

  • [DATA1:2023 - Injection Attacks][DATA1:2023]

    Unauthorized individuals exploiting vulnerabilities to inject malicious code or commands that can compromise data integrity and confidentiality. [Continue reading][DATA1:2023].

Licensing

The OWASP Blockchain AppSec Security Standard Project documents are free to use!

The OWASP Blockchain AppSec Security Standard Project is licensed under the Creative Commons Attribution-ShareAlike 4.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.