Minting Tools
Security
The security model and compilation flow.
Back to the token builderThe contract source is compiled in the browser before deployment so you can inspect the exact source being used. Wallet access is only requested when you choose to connect or deploy.
You should still verify all token parameters, understand the network fees involved, and review transaction prompts in your wallet before approving any deployment.