I tried once, pretending to be a total beginner to “verify” a project that has an upgrade contract and requires multi-signature, and I found the most worry-free part isn’t what it claims—it’s whether it leaves any traces. First, I went through the GitHub commit history: did a whole chunk of code suddenly drop in, is it only one person pushing like crazy, and in the issues has anyone pointed out security traps but no one replied… details like these are quite revealing. Don’t just stare at the audit report’s “passed/no major issues”; I look to see whether high-risk items have clear fixes, and whether there’s a re-audit after the fixes. In any case, that kind of “acknowledged, we’ll handle it later” makes me a bit uneasy. On the multi-signature side, it’s even more straightforward: are the signers properly distributed, is the threshold reasonable, and are there upgrade delays/time locks? Otherwise, to put it bluntly, it’s basically “a few people pressing buttons together,” and if something goes wrong, it can still be changed instantly.



Recently, hardware wallets have been out of stock, and phishing links are everywhere. Now, before I click any “update/sign,” I pause for three seconds. I’d rather miss even a single stealth red line than spend half the night “replaying” it later only to realize the mistake was mine.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin