• Don't deserialize into Addr
  • Build systems that can be upgraded
  • State minimization and module swap example
  • Design for failure
  • Your attackers have unlimited capital
  • IBC is permissionless
  • For contract authors
  • For relayers
  • Math is dangerous
  • Gas