TLDR:Documentation Index
Fetch the complete documentation index at: https://docs.chainstack.com/llms.txt
Use this file to discover all available pages before exploring further.
- Lock down your account first: 2FA, scoped roles, key rotation.
- Lock down your endpoint second: HTTPS/WSS only, access rules (IP and Origin allowlists), basic-auth or key-auth — never both leaked.
- Lock down your code third: secrets via env vars or a secret manager, never on the frontend, keep dependencies patched.
1. Enable 2FA on your Chainstack account
If your account password leaks, 2FA is what stops an attacker from logging in. Turn it on before anything else.- In the Chainstack console, go to Settings → Security → Enable 2FA.
- Use an authenticator app (Authy, 1Password, etc.) — SMS is the weaker option.
2. Use scoped roles for team members
Don’t share the owner account. Invite teammates with the least-privilege role they need.- See Manage your organization for roles (Admin, Editor, Viewer) and how to invite members.
- Audit the member list when people change teams or leave.
3. Always connect over HTTPS / WSS
Plain HTTP exposes endpoint URLs and request bodies on the wire. Every Chainstack endpoint supports TLS — use the HTTPS / WSS URLs only. If your client throwsCERTIFICATE_VERIFY_FAILED, fix the CA bundle, don’t disable verification in production. See Common SSL issues on Python and how to fix it.
4. Pick the right auth method and protect it
Chainstack endpoints support two authentication styles:- Key authentication — the API key is part of the endpoint URL (
https://<network>.core.chainstack.com/<KEY>). Convenient, but anyone who sees the URL has access. - Basic authentication — a username and password sent in the
Authorizationheader.
- Treat keys, usernames, and passwords as secrets — never commit them to git, never paste them in screenshots or tickets.
- Rotate them on a schedule and immediately after any suspected leak. See Manage your node for rotation.
5. Restrict who can reach your endpoint
Access rules add a second perimeter on top of authentication.- IP allowlist — only specific source IPs can call the endpoint. Use it for backend services with stable egress IPs.
- Origin allowlist — only specific
Originheaders (your dapp’s domain) are accepted from browser-side code. - HTTP referrer rules — for browser fetches from particular pages.
6. Never expose secrets on the frontend
A wallet, dapp, or browser extension that calls an RPC endpoint directly leaks that endpoint to every visitor. The standard fix is to proxy through your backend:- Frontend calls your backend.
- Backend calls Chainstack with the real key.
- Backend can additionally rate-limit and validate before forwarding.
7. Keep dependencies patched
Third-party libraries are a common breach vector. Track CVEs for your wallet/RPC/web3 dependencies and update on a regular cadence. Avoid pinning to abandoned forks.8. Be cautious with third-party tools
Browser extensions, RPC proxies, and “free” dashboards that ask for your endpoint URL or wallet are a common phishing surface. Only use tools you’ve vetted; never paste production endpoint URLs or seed phrases into them.See also
- Manage your organization — 2FA, roles, SSO
- Access rules — IP / Origin / referrer allowlists
- Authentication methods for different scenarios
- How to store your Web3 DApp secrets
- Common SSL issues on Python and how to fix it