narwallet.wnpower.host Open in urlscan Pro
3.140.158.15  Public Scan

URL: https://narwallet.wnpower.host/
Submission: On August 09 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

NARWALLETS
 * Home
 * Easy Staking
 * Our team
 * FAQ
 * Metapool

Install Narwallets v4


THE NEAR CHROME-EXTENSION WALLET


NARWALLETS ALLOWS NEAR USERS TO MANAGE THEIR ASSETS, CONNECT TO DEFI, TO STAKE
AND EARN REWARDS.

Install Narwallets v4



Join the Discord Server for updates


NARWALLETS

Providing NEAR users with

ACCOUNT AND ASSETS MANAGEMENT

You can manage all your NEAR accounts from a single wallet. NEP-141 Token
support, Liquid-Staking suppor, classic staking support and Lockup-account
support.

LIQUID STAKING

Narwallets is integrated with Metapool. You can stake and liquid-unstake with
Meta Pool directly from the wallet!. Leverage your assets with stNEAR, you can
earn additional rewards on the nascent DEFI ecosystem.

NON CUSTODIAL SECURITY

We do not send any of your information to external servers, all your keys and
passwords are encrypted and stored locally


METAPOOL INTEGRATION

We make it easy to stake and unstake NEAR tokens


NARWALLETS IS INTEGRATED WITH METAPOOL, YOU CAN STAKE AND LIQUID UNSTAKE
DIRECTLY FROM THE WALLET.

Process:

 * Open the wallet and select your account, click on "Stake"
 * On confirmation, you receive stNEAR as a new asset in your wallet
 * As part of Metapool every staker and liquidity provider gets $META
 * You are free to use your stNEAR and $META from the Wallet





Our Team


SEBA B.

DEVELOPER


LALA

PM & WALLET UI DESIGN


FRITZ WAGNER

WEB DESIGNER


LUCIO TATO

TECHNOLOGY/ARCHITECTURE


FEDE T.

DEVELOPER


DANI S.

DEVELOPER


SEBA B.

DEVELOPER


LALA

PM & WALLET UI DESIGN


FRITZ WAGNER

WEB DESIGNER


LUCIO TATO

TECHNOLOGY/ARCHITECTURE


FEDE T.

DEVELOPER


DANI S.

DEVELOPER

‹›



FAQ

Common Questions

 * What is Narwallets?
   
   Narwallets is a chrome-extension wallet for the NEAR blockhain. It allows you
   to manage all your NEAR accounts, your NEP-141 Tokens, your Liquid Stake,
   your classical stake and even Lockup accounts.

 * Are my keys secure?
   
   Yes. We store your information only on local chrome storage and all the data
   is encrypted. The walllet is non-cutodial, we do not store your keys,
   password or any information in our servers

 * What is liquid staking?
   
   Liquid staking is an alternative to traditional staking: it allows users to
   stake any amount of NEAR and to effectively unstake their NEAR without the
   requirement of waiting 52 to 65 hours before NEAR token holders get their
   compounded rewards.

 * What is the stNEAR NEP-141 token?
   
   The stNEAR NEP-141 token is the toke you obtain when liquid-staking directly
   from the wallet. The integrateed Metapool functionality tokenizes your stake,
   allowing you to use your staked near as a NEP-141 token, called stNEAR.
   stNEARs represent staked NEAR. The price of stNEAR is incremented every 12
   hours when staking rewards are collected.

 * How long does it take to stake and unstake NEAR?
   
   You can stake NEAR and/or unstake NEAR immediately. There is no waiting time
   with our liquid unstaking swap solution. You pay a swap fee that ranges
   between 0.3% and 3% depending on actual liquidity and the amount you want to
   liquid unstake. You can also chose to unstake by the old method, waiting 2-3
   days but with no fee.

 * Are staking rewards compounded automatically?
   
   Yes, staking rewards are compounded automatically into the stNEAR price.

 * Which security criterias does Narwallets comply?
    1.  Has a security program in place that covers or is dedicated to the
        wallet
    2.  Publishes information about its security program in an easily findable
        place.
    3.  Conducts regular audits of wallet code, at regular intervals of less
        than a year or based on meaningful code changes.
    4.  Conducts regular penetration tests, both “authenticated” and
        “non-authenticated” upon significant code changes.
    5.  Conducts penetration tests on related infrastructure, such as databases,
        virtual machines, web servers, etc.
    6.  Remediates any critical, high, or medium findings from audits (3, 4, an
        5 above) in a rapid fashion, as suggested by auditors. Auditors should
        validate the remediation in their reports.
    7.  Makes such reports (audits, penetration tests) publicly available, on at
        least a summary level.
    8.  When making reports (7) available, wallet projects should ensure the
        equivalent reports appear on the security vendor’s site or simply links
        to the security vendor’s report. This ensures the authenticity of the
        audit reports.
    9.  Conducts operational readiness reviews and testing or an equivalent
        process before deployment to production to ensure that code changes have
        not resulted in unanticipated behavior, compatibility issues, or
        inclusion of vulnerabilities.
    10. Maintains a testnet wallet, available to developers and security
        researchers.
    11. Maintains a bug bounty program.
    12. Implements minimal privilege and access policies with regard to
        supporting infrastructure.
    13. Implements MFA and strong passwords for access to critical related
        systems, such as domain registration, hosting platforms, cloud
        platforms, etc.
    14. Conducts known vulnerability and vulnerable dependency checks; and
        remediates critical, medium, and high findings before deploying to
        testnet or production.
    15. It is listed on the official extension marketplace
    16. Logs are collected from supporting infrastructure, web servers, etc.
    17. Ensures that logs do not contain sensitive information, are encrypted at
        rest in storage, and have restricted access with least privilege.
    18. Enables “audit logs” on related platforms (AWS, GCP, monitoring
        platforms, etc).
    19. Logs shall be maintained for 90 days for forensic purposes.
    20. Security feature shall be enabled in hosting environments, i.e. AWS
        GuardDuty.
    21. Inputs shall be sanitized.
    22. Code SAST scanning for vulnerabilities and vulnerable dependencies shall
        be conducted prior to production.
    23. Vulnerability scanning shall be conducted regularly on websites,
        infrastructure-related VMs, etc. Findings shall be quickly remediated.
    24. Patch management shall be conducted frequently on supporting
        infrastructure.
    25. VM and bare-metal infrastructure shall be protected by endpoint
        detection and response software.
    26. An incident monitoring, alerting, and response program shall be in
        place.
    27. Additional protective technologies, such as web application firewalls,
        should be put in place and appropriately configured to prevent attacks
        on the wallet.
    28. White and black lists should be maintained for ip addresses and domains
        interacting with the wallet to the extent possible.
    29. Reduction in attack surface shall be conducted by removing access to
        paths and unused ports; properly configuring domains, CSP, etc.
    30. Access to infrastructure should be limited to VPNs or commensurate
        technology, IP restricted, etc. in order to prevent malicious access.
        For example, port 22 for the web server would not be accessible from the
        internet.
    31. OWASP top 10 vulnerabilities shall be regularly tested and remediated.
    32. Tools such as Nessus and Qualys, or similar should be used to scan for
        vulnerabilities.
    33. Tools such as Burp Suite, or similar should be used to instrument and
        and analyze the interaction of the wallet with the browser for security
        issues.
    34. Playbooks for public disclosure and communication to stakeholders and
        users should be prepared in advance and practiced via tabletop exercises
        in order to ensure rapid response and disclosure to protect such
        stakeholders and their assets.
    35. An incident response retainer should be considered.
    36. Wallet projects should clearly inform users of risks, risky behavior,
        best practices in the use of the wallet, and the most secure methods for
        using the wallet.
    37. Wallet projects should have a clear path to reporting and receiving help
        on issues that is easily found by users.
    38. Sensitive information should not be stored in the client-side wallet in
        a way that could be scraped from storage by malicious software, such as
        keys, recovery phrases, etc.
    39. Encryption of sensitive data should likewise not rely on hard-coded keys
        or weak ciphers.
    40. A user’s ability to recover their wallet under various circumstances
        should be clearly spelled out to the user when setting up the wallet.
    41. Communication between infrastructure elements should be secured to the
        maximum extent possible. Please link to your the statement on your
        website or GitHub repo showing a statement of compliance. Please put
        link below (even if it is a placeholder).

NARWALLETS

Narwallets is a chrome extension wallet built for the NEAR blockchain.

Privacy Policy: Link





 * Home
 * Easy Staking
 * Our team
 * FAQ
 * Metapool