Part 6 · Chapter 4

OpSec for Power Users & Founders

AT A GLANCE

Advanced operational security protects teams, treasuries, and identity. Learn device hygiene, signer separation, and incident response.

Device HygieneNetwork Security2FA HardeningRole SeparationSigner DiversityIncident Response
Section 1

Device & Network Hygiene

Device Security Audit

Device Hardening Score0%

🚨 Significant vulnerabilities. Address critical items immediately.

Network Security

🚨 Significant network exposure.

2FA Method Audit

Crypto exchangescritical
Primary email accountcritical
GitHub / code reposhigh
Password managercritical

💡 Best hierarchy: Hardware Key > Authenticator App > SMS > Nothing

Section 2

Role Separation

Wallet Role Architecture

Mark which dedicated wallets you maintain (aim for 3-4 separated roles):

Signer Diversity & Rotation

🚨 Low diversity. Multi-sig may provide false sense of security.

Section 3

Incident Response

IR Readiness Checklist

🚨 Not prepared for incidents. Lack of preparation amplifies damage.

Tabletop Exercise

🚨 Scenario: Private Key Compromise

It's 2 AM. Your monitoring bot alerts: deployer wallet submitted unexpected ownership transfer to unknown address.

Q1: What's your FIRST action?

Q2: Contract paused. What's next?

OpSec Scorecard

Overall OpSec Score0%

🚨 Critical gaps. Prioritize: dedicated device, multi-sig admin, IR playbook.

Watch Out

Common Mistakes

💻
I use the same MacBook for personal browsing and treasury signing — it's more convenient
One compromised website or extension and your treasury is exposed. Dedicated signing devices are non-negotiable.
👑
Our admin is a single-key EOA because multi-sig is slow
Speed is worthless if one compromised key drains everything. Multi-sig with time-locks is the standard.
🏢
Our 3-of-5 multi-sig has all keys in the same office
Same location defeats multi-sig purpose. Diversify brands AND locations.

Golden Rule: At the power-user level, security is a process, not a feature. It is something you practice, audit, and improve continuously.

Test Yourself

Knowledge Check

1

Why separate admin and daily wallets?

2

What should replace SMS 2FA?

3

Why run incident response drills?

4

FIRST action if front-end is compromised?

5

Why diversify multi-sig signers?

Next Steps

Continue learning: Common DeFi Exploits Overview
Hands-on: Draft an OpSec checklist for your team