Security
Best Practices
Never expose client secrets: Store OAuth secrets server-side only
Validate on both sides: Check attestations client-side and on-chain
Use HTTPS in production: Required for OAuth and wallet connections
Implement rate limiting: Prevent abuse of verification endpoints
Monitor attestations: Track verification patterns for anomalies
OAuth Security
The SDK implements several security measures:
CSRF Protection: State parameter validation
PKCE for Twitter: Prevents authorization code interception
HttpOnly Cookies: Access tokens stored securely
Origin Validation: Ready to uncomment for production
Timeout Protection: 5-minute OAuth timeout
Secure postMessage: Origin-checked token transfer
Production Checklist:
Uncomment origin validation in
oauth.ts:
// Uncomment this line:
// if (event.origin !== window.location.origin) return;Use environment-specific callback URLs
Rotate OAuth secrets regularly
Monitor failed authentication attempts
Signature Validation
Attestations use EIP-712 signatures:
Signatures are created server-side and verified on-chain.
Last updated