Security Overview
Security best practices for building with Aegis.
Security Layers
1. On-Chain Security
Aegis Protocol enforces security on-chain:
- Daily limits prevent excessive spending
- Whitelists restrict recipient addresses
- Pause function provides emergency stop
- Checked arithmetic prevents overflow
2. Key Management
Secure your private keys:
- Use environment variables
- Never commit keys to version control
- Rotate keys regularly
- Use hardware wallets for high-value vaults
3. Network Security
Protect your infrastructure:
- Use HTTPS for all API calls
- Implement rate limiting
- Validate all inputs
- Monitor for suspicious activity
4. Application Security
Build secure applications:
- Pre-flight validation
- Error handling
- Logging and monitoring
- Circuit breakers
Quick Checklist
- ✅ Store keys securely
- ✅ Use daily limits
- ✅ Whitelist recipients
- ✅ Monitor transactions
- ✅ Implement alerting
- ✅ Test on devnet first
- ✅ Use dedicated RPC
- ✅ Enable 2FA where possible
Next Steps
🔒 Best Practices
Production security guidelines View Guide →
🔑 Key Management
Secure key storage and rotation View Guide →