Web3

DYOR (Do Your Own Research)

A widely used crypto community phrase encouraging individuals to independently investigate projects, tokens, and protocols before investing or participating. DYOR means reading documentation, checking audit reports, verifying team backgrounds, reviewing on-chain data, and understanding tokenomics rather than relying solely on social media hype or influencer recommendations. The phrase serves as both advice and a disclaimer in crypto discussions.

IDdyorAliasDYOR

Plain meaning

Start with the shortest useful explanation before going deeper.

A widely used crypto community phrase encouraging individuals to independently investigate projects, tokens, and protocols before investing or participating. DYOR means reading documentation, checking audit reports, verifying team backgrounds, reviewing on-chain data, and understanding tokenomics rather than relying solely on social media hype or influencer recommendations. The phrase serves as both advice and a disclaimer in crypto discussions.

Mental model

Use the quick analogy first so the term is easier to reason about when you meet it in code, docs, or prompts.

Think of it as a building block that connects one definition to the larger Solana system around it.

Technical context

Place the term inside its Solana layer so the definition is easier to reason about.

Wallets, signing flows, dApps, and key management concepts.

Why builders care

Turn the term from vocabulary into something operational for product and engineering work.

This term unlocks adjacent concepts quickly, so it works best when you treat it as a junction instead of an isolated definition.

AI handoff

AI handoff

Use this compact block when you want to give an agent or assistant grounded context without dumping the entire page.

DYOR (Do Your Own Research) (dyor)
Category: Web3
Definition: A widely used crypto community phrase encouraging individuals to independently investigate projects, tokens, and protocols before investing or participating. DYOR means reading documentation, checking audit reports, verifying team backgrounds, reviewing on-chain data, and understanding tokenomics rather than relying solely on social media hype or influencer recommendations. The phrase serves as both advice and a disclaimer in crypto discussions.
Aliases: DYOR
Related: Rug Pull, Security Audit
Glossary Copilot

Ask grounded Solana questions without leaving the glossary.

Use glossary context, relationships, mental models, and builder paths to get structured answers instead of generic chat output.

Explain this code

Optional: paste Anchor, Solana, or Rust code so the Copilot can map primitives back to glossary terms.

Ask a glossary-grounded question

Ask a glossary-grounded question

The Copilot will answer using the current term, related concepts, mental models, and the surrounding glossary graph.

Concept graph

See the term as part of a network, not a dead-end definition.

These branches show which concepts this term touches directly and what sits one layer beyond them.

Branch

Rug Pull

A crypto scam where project creators abandon a project after accumulating user funds, typically by draining liquidity pools, selling pre-minted tokens, or exploiting admin keys. Red flags: anonymous teams, unaudited contracts, concentrated token supply, locked liquidity absent, and excessive hype. Always verify program source, check authorities, and review audits before depositing.

Branch

Security Audit

A formal, structured review of a Solana program's source code, architecture, and deployment configuration by experienced security researchers, aimed at identifying vulnerabilities — including but not limited to the OWASP-equivalent Solana Top 10 (missing signer checks, owner checks, arithmetic errors, etc.) — before mainnet deployment. Reputable Solana-focused audit firms include OtterSec, Ackee Blockchain, sec3 (formerly Soteria), Neodyme, Trail of Bits, and Halborn; most audits produce a severity-rated finding report (critical, high, medium, low, informational) that programs are expected to remediate and publish. A single audit is considered minimum due diligence for programs holding significant user funds; continuous auditing and bug bounties on platforms like Immunefi are considered best practice.

Next concepts to explore

Keep the learning chain moving instead of stopping at one definition.

These are the next concepts worth opening if you want this term to make more sense inside a real Solana workflow.

Web3

Rug Pull

A crypto scam where project creators abandon a project after accumulating user funds, typically by draining liquidity pools, selling pre-minted tokens, or exploiting admin keys. Red flags: anonymous teams, unaudited contracts, concentrated token supply, locked liquidity absent, and excessive hype. Always verify program source, check authorities, and review audits before depositing.

Security

Security Audit

A formal, structured review of a Solana program's source code, architecture, and deployment configuration by experienced security researchers, aimed at identifying vulnerabilities — including but not limited to the OWASP-equivalent Solana Top 10 (missing signer checks, owner checks, arithmetic errors, etc.) — before mainnet deployment. Reputable Solana-focused audit firms include OtterSec, Ackee Blockchain, sec3 (formerly Soteria), Neodyme, Trail of Bits, and Halborn; most audits produce a severity-rated finding report (critical, high, medium, low, informational) that programs are expected to remediate and publish. A single audit is considered minimum due diligence for programs holding significant user funds; continuous auditing and bug bounties on platforms like Immunefi are considered best practice.

Web3

Exit Liquidity

Describes retail buyers who purchase a token while insiders or early holders sell, unknowingly providing the liquidity for those early holders to exit their positions profitably. 'You are the exit liquidity' is a cynical observation about memecoin and NFT dynamics where latecomers absorb losses so early participants can take profits. Understanding this concept is critical for evaluating token launches.

Web3

Diamond Hands

Holding a position through extreme price volatility without selling, implying conviction and psychological resilience. The diamond emoji became shorthand during the 2021 bull cycle across crypto and meme stock communities. Diamond hands is celebrated when the asset eventually recovers or appreciates, but can also lead to significant losses if conviction is misplaced. Counterpart to paper hands.

Commonly confused with

Terms nearby in vocabulary, acronym, or conceptual neighborhood.

These entries are easy to mix up when you are reading quickly, prompting an LLM, or onboarding into a new layer of Solana.

Web3kyc

KYC (Know Your Customer)

Identity verification procedures required by financial regulations that involve confirming a user's real-world identity through government-issued documents, proof of address, and sometimes biometric checks. Centralized exchanges and fiat on-ramp services typically require KYC before allowing trading or withdrawals. Most DeFi protocols on Solana are permissionless and do not require KYC, which is both a feature (accessibility) and a regulatory concern.

AliasKYCAliasKnow Your Customer
Related terms

Follow the concepts that give this term its actual context.

Glossary entries become useful when they are connected. These links are the shortest path to adjacent ideas.

Web3rug-pull

Rug Pull

A crypto scam where project creators abandon a project after accumulating user funds, typically by draining liquidity pools, selling pre-minted tokens, or exploiting admin keys. Red flags: anonymous teams, unaudited contracts, concentrated token supply, locked liquidity absent, and excessive hype. Always verify program source, check authorities, and review audits before depositing.

Securityaudit

Security Audit

A formal, structured review of a Solana program's source code, architecture, and deployment configuration by experienced security researchers, aimed at identifying vulnerabilities — including but not limited to the OWASP-equivalent Solana Top 10 (missing signer checks, owner checks, arithmetic errors, etc.) — before mainnet deployment. Reputable Solana-focused audit firms include OtterSec, Ackee Blockchain, sec3 (formerly Soteria), Neodyme, Trail of Bits, and Halborn; most audits produce a severity-rated finding report (critical, high, medium, low, informational) that programs are expected to remediate and publish. A single audit is considered minimum due diligence for programs holding significant user funds; continuous auditing and bug bounties on platforms like Immunefi are considered best practice.

More in category

Stay in the same layer and keep building context.

These entries live beside the current term and help the page feel like part of a larger knowledge graph instead of a dead end.

Web3

Web3

The vision of a decentralized internet built on blockchain technology, where users own their data, identity, and digital assets. Web1 was read-only (static pages), Web2 is read-write (platforms like social media), Web3 is read-write-own (permissionless, user-sovereign). Web3 applications use wallets instead of logins and smart contracts instead of centralized servers.

Web3

dApp (Decentralized Application)

An application with its backend logic running on a blockchain as smart contracts rather than centralized servers. dApps typically have a traditional web frontend that interacts with on-chain programs via RPC. Users authenticate with wallets instead of username/password. Examples: Uniswap (Ethereum DEX), Jupiter (Solana DEX), Magic Eden (NFT marketplace).

Web3

Wallet

Software or hardware that manages cryptographic keys and enables users to sign transactions, view balances, and interact with dApps. Hot wallets (Phantom, Solflare, Backpack) are internet-connected for convenience. Cold wallets (Ledger, Trezor) store keys offline for security. Wallets don't actually 'hold' tokens—they hold the private keys that control on-chain accounts.

Web3

Seed Phrase (Mnemonic)

A 12 or 24-word human-readable backup of a wallet's master private key, generated using BIP-39 standard. The seed phrase can deterministically regenerate all derived keypairs (BIP-44 derivation paths). Losing the seed phrase means permanently losing access to all associated accounts. Never share, photograph, or store seed phrases digitally in plain text.