security model

Threats

  • Fake usage receipts

  • Replay attacks

  • Signature forgery

  • Token approval abuse

Mitigations

  • EIP-712 typed signatures

  • Nonce per receipt

  • Receipt expiration

  • Pausable contracts

Was this helpful?