Skip to content

Latest commit

 

History

History
33 lines (30 loc) · 771 Bytes

Manual review approaches.md

File metadata and controls

33 lines (30 loc) · 771 Bytes

Auditors have different approaches to manual reviewing smart contract code for vulnerabilities.

  1. Starting with access control
  2. Starting with asset flow
  3. Starting with control flow
  4. Starting with data flow
  5. Inferring constraints
  6. Understanding dependencies
  7. Evaluating assumptions
  8. Evaluating security checklists

Slide Screenshot

090.jpg


Slide Text

  • Different Approaches
  • Access Control
  • Asset Flow
  • Control Flow
  • Data Flow
  • Different Focus
  • Inferring Constraints
  • Dependencies
  • Assumptions
  • Checklists

References


Tags