In threat modeling, this refers to an actor (user, external service, smart contract, etc.) that interacts with the system.
This refers to a valuable resource (tokens, data, etc.) that needs to be protected.
This refers to a point (API, UI, contract function, etc.) where external entities can access or influence the system.
This describes potential attack or threat situations in the form of scenarios.
Last updated 7 months ago