Interact with smart accounts as contracts, not EOAs. Be aware of smart account policies that may affect transactions. Transactions are validated by smart account logic. Handle validation errors and policy rejections appropriately.
Use verification status for access control and features. Do not request or store personal identity data. Leverage verified identity for trust establishment. Use identity verification to support compliance requirements.
Design flows around identity-anchored access. Do not implement key management or recovery mechanisms. Leverage simplified user experience without key management. Handle identity verification errors and recovery scenarios.