Auditors have different approaches to manual reviewing smart contract code for vulnerabilities.
- Starting with access control
- Starting with asset flow
- Starting with control flow
- Starting with data flow
- Inferring constraints
- Understanding dependencies
- Evaluating assumptions
- Evaluating security checklists
- Different Approaches
- Access Control
- Asset Flow
- Control Flow
- Data Flow
- Different Focus
- Inferring Constraints
- Dependencies
- Assumptions
- Checklists