The Web3 Security Resources Hub is a comprehensive collection of curated tools, guides, and best practices for securing decentralized systems and smart contracts in the blockchain space.
-
Updated
May 27, 2025
The Web3 Security Resources Hub is a comprehensive collection of curated tools, guides, and best practices for securing decentralized systems and smart contracts in the blockchain space.
The purpose of this document is to outline the security risks and vulnerabilities that may arise when implementing ChatGPT in web applications and to provide best practices for mitigating these risks.
A comprehensive Solidity Style Guide to ensure consistent, readable, and maintainable smart contracts. Features include coding conventions, best practices for gas optimization and security, standardized naming, and effective documentation techniques. Ideal for developers seeking to improve their Solidity projects.
AWS multi-account setup via IAC, with scripts for bootstrapping and custom usage
Master the AZ-104 certification with a comprehensive guide that seamlessly integrates Azure administration expertise and DevOps best practices for cloud
A PHP tool to lint PHP files for security issues based on CIS and OWASP best practices.
A model-agnostic security framework that brings secure-by-default practices to AI-assisted software development. This project provides a curated ruleset of security workflows, reusable command templates, and automated validations designed to catch misconfigurations, enforce compliance, and harden code during generation and review.
secure JWT Authentication with Refresh Token flow using ASP.NET Core Minimal API. Includes access token expiry handling, refresh token rotation, in-memory token store, middleware-based auth, and clean end-to-end API security implementation—ideal for learning modern backend authentication.
The OpenSSL Key and Sign Utility is a Python script that provides a graphical user interface (GUI) for generating RSA key pairs, signing files, and verifying signatures using the OpenSSL command-line tool.
Security implementation guides covering modern security practices, authentication, authorization, and compliance frameworks
🐉 Experience a detailed showcase of exploit discovery, analysis, reproduction, and documentation of five XSS vulnerabilities impacting an outdated WordPress version. 🔍💻📄
Azure Policy Governance and Compliance Automation framework, enabling seamless management, monitoring, and enforcement of policies in Azure
A Grimoire for Paranoid GPG Generation That Would Make Stallman Cry Tears of Pure Entropy
Azure Policy Governance and Compliance Automation framework, enabling seamless management, monitoring, and enforcement of policies in Azure
Comprehensive and practical API Security Checklist - Complete guide for secure API design, development, and deployment
Tesla News Articles is a PHP application that retrieves and displays news articles about Tesla using the NewsAPI. It fetches recent articles, processes the data, and presents it in a user-friendly format on a webpage.
Practical AWS Security best practices checklist covering IAM, Data Protection, Logging, Network Security, and Threat Detection.
Design and implement a resilient API gateway on Amazon Web Services (AWS) to ensure high availability, automatic failover, and secure access to endpoints without user authentication. Simplify API management and proxy 3rd party APIs with ease.
AWS incident simulation documenting recovery from loss of MFA access after offboarding failure. Covers IAM investigation, CLI recovery, internal verification, RCA, and preventive measures — based on SME experience in AWS account security.
Add a description, image, and links to the security-best-practices topic page so that developers can more easily learn about it.
To associate your repository with the security-best-practices topic, visit your repo's landing page and select "manage topics."