Introduction
This chapter will discuss the security measures implemented by Gradient, the risks associated with using the platform as a permissionless, self-custodial protocol, and good practices to minimize and manage exposure to these risks.
Last updated