EVM Security Checklists
Battle-tested security checklists for Ethereum and EVM-compatible chains. Covering general DeFi protocols, specialized bridge security, stablecoin protocols, and patterns from 100+ audits.
General EVM Security
Comprehensive security checklist covering DeFi protocols, bridges, lending, AMMs, stablecoins, and common Solidity vulnerabilities across all EVM chains.
Cross-Chain Bridges
Comprehensive security checklist for cross-chain bridges covering validator security, message verification, liquidity pools, and bridge-specific vulnerabilities.
Stablecoin Security
52 critical security checks for stablecoin protocols covering depeg protection, oracle security, collateral management, and governance controls.
Proxy & Upgradeability
33 security checks for proxy patterns including UUPS, Transparent Proxy, Beacon, Minimal Proxy, and Diamond. Storage safety, initialization, delegatecall, and upgrade mechanisms.
GameFi & Play-to-Earn
55 security checks for gaming protocols, NFT games, and play-to-earn platforms. Tokenomics, NFT mechanics, marketplace security, game logic vulnerabilities, and player incentive systems.
More checklists coming soon

