Skip to main content

Application Security

Grove provides an extensive suite of security settings, allowing you to fine-tune the security measures applied to your application. These security settings, when judiciously applied, form a comprehensive security framework for your Grove application. Tailoring these settings to your project's specific requirements allows you to construct a fortified environment, minimizing vulnerabilities and protecting against the unique risks presented by blockchain technology.

Secret Key Required

Enforce stringent security by requiring a private secret key for all incoming requests. This ensures that only authenticated requests with the correct secret key are processed.

  • Toggle: Easily activate or deactivate the secret key requirement as needed for enhanced control over application access.

Approved Chains

Narrow down the blockchain networks your application can interact with, effectively preventing any interaction with unauthorized or unintended networks.

  • Add Chain: Seamlessly integrate a blockchain network into your application's approved list, specifying which chains are permitted.

Whitelist User-Agents

Control access based on the HTTP User-Agents, allowing only recognized agents to make requests. This feature is crucial for blocking unwanted or potentially harmful traffic.

  • Add User-Agent: Input and register the User-Agent strings you trust, creating a customized access list for your application.

Whitelist Origins

Specify which HTTP Origins are authorized to interact with your application, creating a secure boundary that only permits requests from known sources.

  • Add Origin: Define and add the allowed origins, ensuring that your application communicates exclusively with trusted entities.

Whitelist Contracts

Limit interactions to predefined smart contract addresses. This selective approach ensures that your application's blockchain interactions are restricted to specified contracts.

  • Add Contract: Designate and whitelist specific smart contract addresses, narrowing down the contracts your application can engage with.

Whitelist Methods

By specifying which RPC methods your application can use, you prevent unauthorized operations and misuse, ensuring that only intended functionalities are accessible.

  • Add Method: Choose and restrict the RPC methods available to your application, safeguarding against unintended or malicious use.