Sales

Walk-through: A Journey With Us to Secure Your Hyperledger Fabric Project

QuillAudits WhiteLabel Partnership Program

Walk-through: A Journey With Us to Secure Your Sui Smart Contract

Walk-through: A Journey With Us to Secure Your Polkadot Smart Contract

Walk-through: A Journey With Us to Secure Your Wallet

Pre-Launch Security Checklist for web3 Projects

Development-Process Checklist

Walk-through: A Journey With Us to Secure Your Starknet Smart Contract

Walk-through: A Journey With Us to Secure Your ZKSync Smart Contracts

Walk-through: A Journey With Us to Secure Your L1 Blockchain

Walk-through: A Journey With Us to Secure Your Smart Contracts

Walk-through: A Journey With Us to Assure Your Users and Gain the Trust You Deserve

Walk-through: A Journey With Us to Build Secure and Scalable Dapp Architecture

Walk-through: a journey with us to secure your dApp

Walk-through: a journey with us to secure Solana Smart Contracts.

Audit Readiness Checklist

QuillAudits Periodic On-Chain Analysis of your web3 Project

Miscellaneous

โ† Back to home

โœ“ Security Checklist for Pre-Launch (Web3)


๐Ÿ“‘ย Smart Contract Security

<aside> <img src="/icons/info-alternate_blue.svg" alt="/icons/info-alternate_blue.svg" width="40px" /> Smart Contract security is crucial in web3 projects to ensure the integrity of decentralized applications and prevent exploits.

</aside>

๐Ÿ’ณย Wallet Security

<aside> <img src="/icons/info-alternate_blue.svg" alt="/icons/info-alternate_blue.svg" width="40px" /> Wallet security is essential for protecting the private keys used to access digital assets and transact in web3 environments.

</aside>

๐ŸŒย Web3 API Security

<aside> <img src="/icons/info-alternate_blue.svg" alt="/icons/info-alternate_blue.svg" width="40px" /> Web3 API security is necessary to prevent unauthorized access to sensitive user data and ensure the confidentiality and integrity of interactions with decentralized applications.

</aside>

CI/CD Pipeline Implementation

๐Ÿ—ƒ๏ธย Node and Infrastructure Security

<aside> <img src="/icons/info-alternate_blue.svg" alt="/icons/info-alternate_blue.svg" width="40px" /> Node and infrastructure security is vital to protect the underlying infrastructure and prevent attacks on the network and its participants.

</aside>

Maintain dedicated air-gapped hardware for deployments

Pre-Deployment Phase

Deployment Phase

Post-Deployment Phase

Upgrade Process (if applicable)

๐Ÿ’ฝย Data Security and Privacy

<aside> <img src="/icons/info-alternate_blue.svg" alt="/icons/info-alternate_blue.svg" width="40px" /> Data security and privacy are critical to protect user information and prevent data breaches, especially given the decentralized nature of web3 applications.

</aside>