Threat model
Threat Model
Threat vectors:
Compromised session keys
Overbroad permissions (unscoped delegation)
Replay attacks or race conditions
Mitigation:
Allow only specific method selectors
Set TTL (time-to-live) on delegation
Use nonces and hash commitments in signed payloads
Last updated