The Web3 Security Resources Hub is a comprehensive collection of curated tools, guides, and best practices for securing decentralized systems and smart contracts in the blockchain space.
-
Updated
May 27, 2025
The Web3 Security Resources Hub is a comprehensive collection of curated tools, guides, and best practices for securing decentralized systems and smart contracts in the blockchain space.
The purpose of this document is to outline the security risks and vulnerabilities that may arise when implementing ChatGPT in web applications and to provide best practices for mitigating these risks.
A comprehensive Solidity Style Guide to ensure consistent, readable, and maintainable smart contracts. Features include coding conventions, best practices for gas optimization and security, standardized naming, and effective documentation techniques. Ideal for developers seeking to improve their Solidity projects.
AWS multi-account setup via IAC, with scripts for bootstrapping and custom usage
Master the AZ-104 certification with a comprehensive guide that seamlessly integrates Azure administration expertise and DevOps best practices for cloud
A PHP tool to lint PHP files for security issues based on CIS and OWASP best practices.
A model-agnostic security framework that brings secure-by-default practices to AI-assisted software development. This project provides a curated ruleset of security workflows, reusable command templates, and automated validations designed to catch misconfigurations, enforce compliance, and harden code during generation and review.
secure JWT Authentication with Refresh Token flow using ASP.NET Core Minimal API. Includes access token expiry handling, refresh token rotation, in-memory token store, middleware-based auth, and clean end-to-end API security implementation—ideal for learning modern backend authentication.
The OpenSSL Key and Sign Utility is a Python script that provides a graphical user interface (GUI) for generating RSA key pairs, signing files, and verifying signatures using the OpenSSL command-line tool.
Security implementation guides covering modern security practices, authentication, authorization, and compliance frameworks
A secure, production-grade DevSecOps pipeline for GKE Autopilot orchestrated via GitHub Actions and Terraform. This project implements a 'zero-trust' security model by leveraging Workload Identity Federation (WIF) to eliminate long-lived service account keys, ensuring a hardened CI/CD workflow from code commit to deployment.
This package helps administrators of Forgejo (or Git hosting platforms) generate clear, actionable anti-crawling measures by analyzing user-provided text inputs. When given a description of suspicious
Azure Policy Governance and Compliance Automation framework, enabling seamless management, monitoring, and enforcement of policies in Azure
Azure Policy Governance and Compliance Automation framework, enabling seamless management, monitoring, and enforcement of policies in Azure
A Grimoire for Paranoid GPG Generation That Would Make Stallman Cry Tears of Pure Entropy
🐉 Experience a detailed showcase of exploit discovery, analysis, reproduction, and documentation of five XSS vulnerabilities impacting an outdated WordPress version. 🔍💻📄
Personal repository of a Cybersecurity & Ethical Hacking Expert. Created as a knowledge base focused on customizing, streamlining, and hardening development environments. Emphasizes reliability, operational efficiency, and adherence to open‑source best practices.
Tesla News Articles is a PHP application that retrieves and displays news articles about Tesla using the NewsAPI. It fetches recent articles, processes the data, and presents it in a user-friendly format on a webpage.
Design and implement a resilient API gateway on Amazon Web Services (AWS) to ensure high availability, automatic failover, and secure access to endpoints without user authentication. Simplify API management and proxy 3rd party APIs with ease.
Add a description, image, and links to the security-best-practices topic page so that developers can more easily learn about it.
To associate your repository with the security-best-practices topic, visit your repo's landing page and select "manage topics."