I’m about to deploy Smart contract Token for a project tokenomic.
After few reads and understanding of the few historic exploit that happened on various projects,
Can we conclude that the best way to avoid “exploit” & “hack” is to write the simpliest smart contract, with only mandatory function like send / receive / read and avoid to add any extra function.
No burn, no mint, no transferowner, nothing
Handle the lock/unlock manualy from seed wallet and ensure the seedpassphrase of this wallet is never compromised by anyone else who isn’t in charge of this wallet.
Am I correct ?
Thank you for your help