-
Notifications
You must be signed in to change notification settings - Fork 143
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
NEP-452 (linkdrop): Change status to "final" + add it to README.md. (#…
…543) Make the NEP-452 present in the NEPs list. Change its status to "final".
- Loading branch information
Showing
2 changed files
with
3 additions
and
2 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -3,7 +3,7 @@ NEP: 452 | |
Title: Linkdrop Standard | ||
Author: Ben Kurrek <[email protected]>, Ken Miyachi <[email protected]> | ||
DiscussionsTo: https://gov.near.org/t/official-linkdrop-standard/32463/1 | ||
Status: Draft | ||
Status: Final | ||
Type: Standards Track | ||
Category: Contract | ||
Version: 1.0.0 | ||
|
@@ -194,7 +194,7 @@ Below are some references for linkdrop contracts. | |
|
||
Another important security implication of linkdrop creation is to ensure that only one key is mapped to a set of assets at any given time. Externally, assets such as FTs, and NFTs belong to the overall linkdrop contract account rather than a specific access key. It is important to ensure that specific keys can only claim assets that they are mapped to. | ||
|
||
2. Linkdrop Key Management | ||
2. Linkdrop Key Management | ||
Key management is a critical safety component of linkdrops. The linkdrop contract should implement a key management strategy for keys such that a reentrancy attack does not occur. For example, one strategy may be to "lock" or mark a key as "in transfer" such that it cannot be used again until the transfer is complete. | ||
|
||
3. Asset Refunds & Failed Claims | ||
|