Security center

1for49 Game Protocol security model and resources

Protocol-focused security guidance for wallet safety, claim execution, verification surfaces, and support boundaries across the 1for49 Game Protocol.

Last updated: March 11, 2026

Protected by protocol design

  • Non-custodial wallet control for all participant actions.
  • Explicit on-chain state transitions for place-picks, reveal, and claim.
  • Public protocol accounts for configuration, vault balances, and claim paths.
  • Visible claim-readiness logic based on entry status, prize-vault balances, and round state.

Not guaranteed by protocol

  • Automatic guarantee of external token quality or token value.
  • Reversal of finalized blockchain transactions.
  • Protection from user wallet compromise or unsafe signing behavior.
  • Legal, tax, or jurisdiction-specific compliance outcomes for participants.
Verification resources

Where to verify mechanism and state details

Public protocol surfaces are useful only if participants inspect them before acting. For higher-value interactions, verify configuration, prize-vault balances, and claim state directly.

Responsible disclosure

Report a security concern

Send security concerns to:

contact@currinfo.com

Target initial triage period: within 72 hours.

  • Include wallet address, cluster, transaction signature, and clear reproduction steps.
  • Do not send private keys, seed phrases, or wallet backups.
  • Use support channels for platform guidance and indexing issues, not transaction reversal requests.

For non-security product questions, use support.

Wallet safety

Signing checklist before every transaction

Check the domain and route before connecting your wallet.
Review every signature request carefully before approving it.
Never share seed phrase, private keys, or recovery words with anyone.
Use a hardware wallet for higher-value interactions when possible.
Run a small-value test before larger round entries or claims.
Resource set

Protocol security resources

Lifecycle rules, value-flow references, and public verification surfaces for protocol use.

Resource set

Operational security resources

Wallet safety, activity inspection, and practical guidance for daily usage.

Resource set

Policies and disclosures

Terms, privacy, and disclosure documents that define usage and support boundaries.