Assessment reports>Chainflip>Threat Model>Verified key-gated instructions

Verified key-gated instructions

The following instructions were verified to have proper access controls as intended per the provided documentation:

Zellic © 2024Back to top ↑