{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"How does ESIP-2 enable the secure hosting of Ethscriptions through smart contracts?","a":"Ensure the security of contract code: When writing smart contracts, follow best practices and avoid using unsafe methods. Ensure that the contract is not affected by common attacks such as reentrancy attacks and vulnerability exploitation by auditing and testing the contract."}]}],"pr":"14f5052f8a4b6d3f591dad26b22764e154a11a73bafcdc8664c6c210c5b9c759"}