Erik Trautman
Erik Trautman

Reputation: 6029

What is the best practice for handling an exposed seed phrase on NEAR Protocol?

When it's just an access key that is compromised on NEAR, it is easy to add a new key and delete the compromised one with add-key and delete-key commands.

But what if a 12-word seed phrase (eg for a wallet recovery) is compromised for an account like foo.near? How do you swap keys safely such that the account is no longer compromised (and you don't have to create a new account)?

Upvotes: 2

Views: 139

Answers (1)

BenTheHumanMan
BenTheHumanMan

Reputation: 327

You need to delete the account and transfer funds. Then you can create an account with the same name and the wallet will generate a new seed phrase

Upvotes: 1

Related Questions