Security
Secure Xian contracts come from simple control flow, explicit authorization, careful cross-contract boundaries, and thorough local testing.
Core Principles
- authenticate the immediate caller, not just the original signer
- validate every numeric and address input
- update local state before external contract calls when possible
- avoid hidden complexity and dynamic behavior
- treat every exported function as public and adversarially callable