layout | title | tags | level | type | pitch |
---|---|---|---|---|---|
col-sidebar |
OWASP BlockChain AppSec Security Standard |
blockchain data datasecurity security top10 data-security blockchain-security web3-security blockchain-data-security roadmap news acknowledgments |
4 |
documentation |
The guide focuses on blockchain, decentralized applications (D-Apps), NFTs, cryptocurrency, and related infrastructure providing best practices, known risks and mitigations and other information related to the unique challenges of understanding blockchain. |
The guide focuses on blockchain, decentralized applications (D-Apps), NFTs, cryptocurrency, and related infrastructure providing best practices, known risks and mitigations and other information related to the unique challenges of understanding blockchain.
You do not have to be a security expert or a programmer to contribute. Contact the project leader(s) to get involved. We welcome any suggestions and comments. Possible ways to contribute:
- We are actively looking for organizations and individuals who understand blockchain security challenges.
- Individuals and organizations contributing to the project will be listed on the acknowledgments page.
Blockchain is the technological backbone of Web3 and as a fundamental technology, like a database, allows for new types of systems in Web3. Web3, built from blockchain, is a tokenization system that is unique to the owner that can provide absolute, transparent authority.
An example of such a system in Web3, built from the foundation of blockchain is as follows:
A user logs in to a website for the first time using their on-chain wallet address with a single signature passwords, user accounts, all new interaction on the web. The worst thing to ever happen to blockchain is cryptocurrency.
-
[DATA1:2023 - Injection Attacks][DATA1:2023]
Unauthorized individuals exploiting vulnerabilities to inject malicious code or commands that can compromise data integrity and confidentiality. [Continue reading][DATA1:2023].
-
[DATA1:2023 - Injection Attacks][DATA1:2023]
Unauthorized individuals exploiting vulnerabilities to inject malicious code or commands that can compromise data integrity and confidentiality. [Continue reading][DATA1:2023].
The OWASP Blockchain AppSec Security Standard Project documents are free to use!
The OWASP Blockchain AppSec Security Standard Project is licensed under the Creative Commons Attribution-ShareAlike 4.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.