EVM Security Checklists
Battle-tested security checklists for Ethereum and EVM-compatible chains. Covering general DeFi protocols, specialized bridge security, stablecoin protocols, and patterns from 40+ audits.
General EVM Security
Comprehensive security checklist covering DeFi protocols, bridges, lending, AMMs, stablecoins, and common Solidity vulnerabilities across all EVM chains.
Cross-Chain Bridges
Comprehensive security checklist for cross-chain bridges covering validator security, message verification, liquidity pools, and bridge-specific vulnerabilities.
Stablecoin Security
52 critical security checks for stablecoin protocols covering depeg protection, oracle security, collateral management, and governance controls.
Proxy & Upgradeability
33 security checks for proxy patterns including UUPS, Transparent Proxy, Beacon, Minimal Proxy, and Diamond. Storage safety, initialization, delegatecall, and upgrade mechanisms.
GameFi & Play-to-Earn
55 security checks for gaming protocols, NFT games, and play-to-earn platforms. Tokenomics, NFT mechanics, marketplace security, game logic vulnerabilities, and player incentive systems.
Uniswap / AMM / DEX
45 security checks for decentralized exchanges and automated market makers. Swap mechanics, oracle security, liquidity management, MEV protection, and common DeFi vulnerabilities.
Liquidity Pool Security
35 deep-dive security checks for DeFi liquidity pools derived from 3,663 real audit findings. Pool creation, LP tokens, concentrated liquidity, rewards, and impermanent loss.
AMM Price & Oracle Security
30 security checks for AMM price mechanisms and oracles derived from 1,327 real audit findings. TWAP oracles, price manipulation, slippage, bonding curves, and oracle integration.
Swap & Trading Security
40 security checks for DEX swap execution and trading derived from 1,505 real audit findings. Routing, MEV protection, fee mechanisms, flash swaps, reentrancy, and token compatibility.
Lending & Borrowing
30 security checks for DeFi lending, CDP, and borrowing protocols. Oracle manipulation, liquidation mechanics, interest rate precision, collateral management, and flash loan exploits.
Staking & Governance
25 security checks for staking, voting, and governance protocols. Vote manipulation, reward timing exploits, epoch boundary attacks, delegation griefing, and vesting bypasses.
Wallet & Account Abstraction
20 security checks for Safe integrations, account abstraction, and smart wallets. EIP-712, Safe version compatibility, guard bypass, signature replay, and recovery exploits.
More checklists coming soon

