SPL
Documentation

Security Features

Built-in security measures and best practices for token creation and management.

Built-in Protections

Input Validation

Automatic

All token parameters are validated before transaction creation to prevent common errors.

Transaction Simulation

Pre-flight

Transactions are simulated before submission to catch potential failures.

Secure Key Handling

Client-side

Private keys never leave your browser. All signing happens locally.

Security Recommendations

Wallet Security

  • Use hardware wallets for high-value operations
  • Verify all transaction details before signing
  • Keep your seed phrase secure and offline
  • Never share private keys or seed phrases

Token Design

  • Consider authority implications carefully
  • Use multisig for important authority roles
  • Document your token's security model
  • Plan for emergency procedures

Network Considerations

  • Use reputable RPC providers
  • Monitor transaction confirmations
  • Be aware of network congestion effects
  • Set appropriate priority fees
Audit Considerations

For production tokens with significant value or complex mechanics, consider:

  • Third-party security audits
  • Formal verification of token contracts
  • Bug bounty programs
  • Regular security reviews