NOT AFFILIATED

Security Policy & Best Practices

Your Security is YOUR Responsibility

CRITICAL DISCLAIMER

WE ARE NOT RESPONSIBLE FOR ANY SECURITY INCIDENTS
This includes but is not limited to: wallet hacks, phishing attacks, malware, stolen funds, compromised accounts, data breaches, or any other security-related losses. You are solely responsible for your own security.

🔐 Wallet Security

Essential Practices

  • Use hardware wallets for large amounts
  • Never share seed phrases with anyone
  • Use separate wallets for different activities
  • Enable all available security features
  • Keep software wallets updated
  • Use strong, unique passwords
  • Only connect wallets to trusted sites

Never Do This

  • Store seed phrases digitally
  • Enter seed phrases on websites
  • Share private keys via messages
  • Use the same wallet for everything
  • Click wallet links in Discord/Telegram
  • Trust "support" asking for phrases
  • Connect wallets to unknown websites

🎭 Common Scams to Avoid

Fake pump.fun Sites

Always verify URL: pump.fun only

Honeypot Tokens

Can't sell after buying

Wallet Drainers

Malicious contracts steal everything

Fake Support

No official support asks for keys

Impersonators

Fake developers or influencers

Airdrop Scams

"Free" tokens that steal on claim

🛡️ Trading Security

Before Trading:

  • Verify program addresses
  • Check holder distribution
  • Look for audit warnings
  • Research the team (if any)
  • Send small test transaction first (Note: automated drainers may monitor for ANY wallet activity)

While Trading:

  • Use proper slippage settings
  • Double-check transaction details
  • Never approve unlimited spending
  • Monitor gas fees

After Trading:

  • Revoke unnecessary approvals
  • Move profits to secure wallets
  • Keep transaction records
  • Monitor wallet for unusual activity

🔌 Extension Security

Wallet Extension Best Practices

  • Only download wallet extensions from official app stores
  • Verify extension developer authenticity
  • Keep extensions updated to latest versions
  • Review and minimize connected sites regularly
  • Use separate browsers for crypto activities
  • Test with small amounts before large transfers (but be aware: any activity may trigger automated drains if compromised)

💻 Device Security

Computer Security

  • Keep OS updated
  • Use firewall
  • Avoid public WiFi
  • Use VPN for privacy

Browser Security

  • Use separate browser for crypto
  • Clear cookies regularly
  • Disable unnecessary extensions
  • Bookmark important sites
  • Use privacy-focused browsers

🚨 Emergency Response

If Your Wallet is Compromised:

  1. Immediately transfer remaining funds to a new wallet
  2. Revoke all token approvals
  3. Never use that wallet again
  4. Check all connected wallets
  5. Report to relevant platforms
  6. Document everything for records
  7. WARNING: Skip test transactions - hackers use listeners that trigger full drains when any activity is detected

📱 Social Engineering Protection

  • Never trust DMs about "opportunities"
  • Ignore "giveaways" requiring deposits
  • Don't click shortened URLs
  • Verify information from multiple sources
  • Be skeptical of urgency tactics
  • Don't share personal information

This security information is provided for educational purposes only. We make no guarantees about its effectiveness. Security practices evolve constantly, and new threats emerge daily.

Remember: In crypto, there is no customer support, no refunds, no reversals, and no protection. Once funds are lost, they're gone forever.

🔐 Golden Rules of Crypto Security

  1. Never share seed phrases
  2. Verify everything twice
  3. If it seems too good to be true, it is
  4. Trust no one completely
  5. Use multiple wallets
  6. Keep most funds offline
  7. Stay educated on new scams