A checklist of things to look for when auditing Solidity smart contracts.
This is not a comprehensive list and solidity is quickly evolving so please do due dilegence on your part.
Not all listed items will apply to your specific smart contract.
- All functions are
internal
except where explictly required to bepublic
/external
. [?] - There are no arithmetic overflows/underflows in math operations.
- Using the OpenZeppelin safe math library [?].
- Ether or tokens cannot be accidentally sent to the address
0x0
. - Conditions are checked using
require
before operations and state changes. - State is being set before and performing actions.
- Protected from reentry attacks (A calling B calling A). [?]
- Properly implements the ERC20 interface [?].
- Only using modifier if necessary in more than one place.
- All types are being explicitly set (e.g. using
uint256
instead ofuint
). - All methods and loops are within the maximum allowed gas limt.
- There are no unnecessary initalizations in the constructor (remember, default values are set).
- There is complete test coverage; every smart contract method and every possible type of input is being tested.
- Performed fuzz testing by using random inputs.
- Tested all the possible different states that the contract can be in.
- Ether and token amounts are dealt in wei units.
- The crowdsale end block/timestamp comes after start block/timestamp.
- The crowdsale token exchange/conversion rate is properly set.
- The crowdsale soft/hard cap is set.
- The crowdsale min/max contribution allowed is set and tested.
- The crowdsale whitelisting functionality is tested.
- The crowdsale refund logic is tested.
- Crowdsale participants are given their proportional token amounts or are allowed to claim their contribution.
- The length of each stage of the crowdsale is properly configured (e.g. presale, public sale).
- Specified which functions are intented to be controlled by the owner only (e.g. pausing crowdsale, progressing crowdsale stage, enabling distribution of tokens, etc..).
- The crowdsale vesting logic is tested.
- The crowdsale has a fail-safe mode that when enabled by owner, restricts calls to function and enables refund functionality.
- The crowdsale has a fallback function in place if it makes reasonable sense.
- The fallback function does not accept call data or only accepts prefixed data to avoid function signature collisions.
- Imported libraries have been previously audited and don't contain dyanmic parts that can be swapped out in future versions which can be be used maliciously. [?]
- Token transfer statements are wrapped in a
require
. - Using
require
andassert
properly. Only useassert
for things that should never happen, typically used to validate state after making changes. - Using
keccak256
instead of the aliassha3
. - Protected from ERC20 short address attack. [?].
- Protected from recursive call attacks.
- Arbitrary string inputs have length limits.
- No secret data is exposed (all data on the blockchain is public).
- Avoided using array where possible and using mappings instead.
- Does not rely on block hashes for randomness (miners have influence on this).
- Does not use
tx.origin
anywhere. [?] - Array items are shifted down when an item is deleted to avoid leaving a gap.
- Use
revert
instead ofthrow
. - Functions exit immediately when conditions aren't meant.
- Using the latest stable version of Solidity.
- Prefer pattern where receipient withdrawals funds instead of contract sending funds, however not always applicable.
- Resolved warnings from compiler.
-
V1
- Can it beinternal
? -
V2
- Can it beconstant
? -
V3
- Can it beimmutable
? -
V4
- Is its visibility set? (SWC-108) -
V5
- Is the purpose of the variable and other important information documented using natspec? -
V6
- Can it be packed with an adjacent storage variable? - [ ]
V7
- Can it be packed in a struct with more than 1 other variable? -
V8
- Use full 256 bit types unless packing with other variables. -
V9
- If it's a public array, is a separate function provided to return the full array? -
V10
- Only useprivate
to intentionally prevent child contracts from accessing the variable, preferinternal
for flexibility.
-
S1
- Is a struct necessary? Can the variable be packed raw in storage? -
S2
- Are its fields packed together (if possible)? -
S3
- Is the purpose of the struct and all fields documented using natspec?
-
F1
- Can it beexternal
? -
F2
- Should it beinternal
? -
F3
- Should it bepayable
? -
F4
- Can it be combined with another similar function? -
F5
- Validate all parameters are within safe bounds, even if the function can only be called by a trusted users. -
F6
- Is the checks before effects pattern followed? (SWC-107) - [ ]-
F7
- Check for front-running possibilities, such as the approve function. (SWC-114) -
F8
- Is insufficient gas griefing possible? (SWC-126) -
F9
- Are the correct modifiers applied, such asonlyOwner
/requiresAuth
? -
F10
- Are return values always assigned? -
F11
- Write down and test invariants about state before a function can run correctly. -
F12
- Write down and test invariants about the return or any changes to state after a function has run. -
F13
- Take care when naming functions, because people will assume behavior based on the name. -
F14
- If a function is intentionally unsafe (to save gas, etc), use an unwieldy name to draw attention to its risk. -
F15
- Are all arguments, return values, side effects and other information documented using natspec? -
F16
- If the function allows operating on another user in the system, do not assumemsg.sender
is the user being operated on. -
F17
- If the function requires the contract be in an uninitialized state, check an explicitinitialized
variable. Do not useowner == address(0)
or other similar checks as substitutes. -
F18
- Only useprivate
to intentionally prevent child contracts from calling the function, preferinternal
for flexibility. -
F19
- Usevirtual
if there are legitimate (and safe) instances where a child contract may wish to override the function's behavior.
-
M1
- Are no storage updates made (except in a reentrancy lock)? -
M2
- Are external calls avoided? -
M3
- Is the purpose of the modifier and other important information documented using natspec?
-
C1
- Using SafeMath or 0.8 checked math? (SWC-101) -
C2
- Are any storage slots read multiple times? -
C3
- Are any unbounded loops/arrays used that can cause DoS? (SWC-128) -
C4
- Useblock.timestamp
only for long intervals. (SWC-116) -
C5
- Don't use block.number for elapsed time. (SWC-116) -
C7
- Avoid delegatecall wherever possible, especially to external (even if trusted) contracts. (SWC-112) -
C8
- Do not update the length of an array while iterating over it. -
C9
- Don't useblockhash()
, etc for randomness. (SWC-120) -
C10
- Are signatures protected against replay with a nonce andblock.chainid
(SWC-121) -
C11
- Ensure all signatures use EIP-712. (SWC-117 SWC-122) -
C12
- Output ofabi.encodePacked()
shouldn't be hashed if using >2 dynamic types. Prefer usingabi.encode()
in general. (SWC-133) -
C13
- Careful with assembly, don't use any arbitrary data. (SWC-127) -
C14
- Don't assume a specific ETH balance. (SWC-132) -
C15
- Avoid insufficient gas griefing. (SWC-126) -
C16
- Private data isn't private. (SWC-136) -
C17
- Updating a struct/array in memory won't modify it in storage. -
C18
- Never shadow state variables. (SWC-119) -
C19
- Do not mutate function parameters. -
C20
- Is calculating a value on the fly cheaper than storing it? -
C21
- Are all state variables read from the correct contract (master vs. clone)? -
C22
- Are comparison operators used correctly (>
,<
,>=
,<=
), especially to prevent off-by-one errors? -
C23
- Are logical operators used correctly (==
,!=
,&&
,||
,!
), especially to prevent off-by-one errors? -
C24
- Always multiply before dividing, unless the multiplication could overflow. -
C25
- Are magic numbers replaced by a constant with an intuitive name? -
C26
- If the recipient of ETH had a fallback function that reverted, could it cause DoS? (SWC-113) -
C27
- Use SafeERC20 or check return values safely. -
C28
- Don't usemsg.value
in a loop. -
C29
- Don't usemsg.value
if recursive delegatecalls are possible (like if the contract inheritsMulticall
/Batchable
). -
C30
- Don't assumemsg.sender
is always a relevant user. -
C31
- Don't useassert()
unless for fuzzing or formal verification. (SWC-110) -
C32
- Don't usetx.origin
for authorization. (SWC-115) -
C33
- Don't useaddress.transfer()
oraddress.send()
. Use.call.value(...)("")
instead. (SWC-134) -
C34
- When using low-level calls, ensure the contract exists before calling. -
C35
- When calling a function with many parameters, use the named argument syntax. -
C36
- Do not use assembly for create2. Prefer the modern salted contract creation syntax. -
C37
- Do not use assembly to access chainid or contract code/size/hash. Prefer the modern Solidity syntax. -
C38
- Use thedelete
keyword when setting a variable to a zero value (0
,false
,""
, etc). -
C39
- Comment the "why" as much as possible. -
C40
- Comment the "what" if using obscure syntax or writing unconventional code. -
C41
- Comment explanations + example inputs/outputs next to complex and fixed point math. -
C42
- Comment explanations wherever optimizations are done, along with an estimate of much gas they save. -
C43
- Comment explanations wherever certain optimizations are purposely avoided, along with an estimate of much gas they would/wouldn't save if implemented. -
C44
- Useunchecked
blocks where overflow/underflow is impossible, or where an overflow/underflow is unrealistic on human timescales (counters, etc). Comment explanations whereverunchecked
is used, along with an estimate of how much gas it saves (if relevant). -
C45
- Do not depend on Solidity's arithmetic operator precedence rules. In addition to the use of parentheses to override default operator precedence, parentheses should also be used to emphasise it. -
C46
- Expressions passed to logical/comparison operators (&&
/||
/>=
/==
/etc) should not have side-effects. -
C47
- Wherever arithmetic operations are performed that could result in precision loss, ensure it benefits the right actors in the system, and document it with comments. -
C48
- Document the reason why a reentrancy lock is necessary whenever it's used with an inline or@dev
natspec comment. -
C49
- When fuzzing functions that only operate on specific numerical ranges use modulo to tighten the fuzzer's inputs (such asx = x % 10000 + 1
to restrict from 1 to 10,000). -
C50
- Use ternary expressions to simplify branching logic wherever possible. -
C51
- When operating on more than one address, ask yourself what happens if they're the same.
-
X1
- Is an external contract call actually needed? -
X2
- If there is an error, could it cause DoS? LikebalanceOf()
reverting. (SWC-113) -
X3
- Would it be harmful if the call reentered into the current function? -
X4
- Would it be harmful if the call reentered into another function? -
X5
- Is the result checked and errors dealt with? (SWC-104) -
X6
- What if it uses all the gas provided? -
X7
- Could it cause an out-of-gas in the calling contract if it returns a massive amount of data? -
X8
- If you are calling a particular function, do not assume thatsuccess
implies that the function exists (phantom functions).
-
S1
- Is an external contract call actually needed? -
S2
- Is it actually marked as view in the interface? -
S3
- If there is an error, could it cause DoS? LikebalanceOf()
reverting. (SWC-113) -
S4
- If the call entered an infinite loop, could it cause DoS?
-
E1
- Should any fields be indexed? -
E2
- Is the creator of the relevant action included as an indexed field? -
E3
- Do not index dynamic types like strings or bytes. -
E4
- Is when the event emitted and all fields documented using natspec? -
E5
- Are all users/ids that are operated on in functions that emit the event stored as indexed fields?
-
T1
- Use an SPDX license identifier. -
T2
- Are events emitted for every storage mutating function? -
T3
- Check for correct inheritance, keep it simple and linear. (SWC-125) -
T4
- Use areceive() external payable
function if the contract should accept transferred ETH. -
T5
- Write down and test invariants about relationships between stored state. -
T6
- Is the purpose of the contract and how it interacts with others documented using natspec? -
T7
- The contract should be markedabstract
if another contract must inherit it to unlock its full functionality. -
T8
- Emit an appropriate event for any non-immutable variable set in the constructor that emits an event when mutated elsewhere. -
T9
- Avoid over-inheritance as it masks complexity and encourages over-abstraction. -
T10
- Always use the named import syntax to explicitly declare which contracts are being imported from another file. -
T11
- Group imports by their folder/package. Separate groups with an empty line. Groups of external dependencies should come first, then mock/testing contracts (if relevant), and finally local imports. -
T12
- Summarize the purpose and functionality of the contract with a@notice
natspec comment. Document how the contract interacts with other contracts inside/outside the project in a@dev
natspec comment.
-
P1
- Use the right license (you must use GPL if you depend on GPL code, etc). -
P2
- Unit test everything. -
P3
- Fuzz test as much as possible. -
P4
- Use symbolic execution where possible. -
P5
- Run Slither/Solhint and review all findings.
-
D1
- Check your assumptions about what other contracts do and return. -
D2
- Don't mix internal accounting with actual balances. -
D3
- Don't use spot price from an AMM as an oracle. -
D4
- Do not trade on AMMs without receiving a price target off-chain or via an oracle. -
D5
- Use sanity checks to prevent oracle/price manipulation. -
D6
- Watch out for rebasing tokens. If they are unsupported, ensure that property is documented. -
D7
- Watch out for ERC-777 tokens. Even a token you trust could preform reentrancy if it's an ERC-777. -
D8
- Watch out for fee-on-transfer tokens. If they are unsupported, ensure that property is documented. -
D9
- Watch out for tokens that use too many or too few decimals. Ensure the max and min supported values are documented. -
D10
- Be careful of relying on the raw token balance of a contract to determine earnings. Contracts which provide a way to recover assets sent directly to them can mess up share price functions that rely on the raw Ether or token balances of an address. -
D11
- If your contract is a target for token approvals, do not make arbitrary calls from user input.
SLoc (cloc)
$ cloc */
86 text files.
86 unique files.
1 file ignored.
github.com/AlDanial/cloc v 1.82 T=0.24 s (354.5 files/s, 86952.0 lines/s)
-------------------------------------------------------------------------------
Language files blank comment code
-------------------------------------------------------------------------------
Solidity 72 3027 6000 10274
TypeScript 13 223 86 1239
-------------------------------------------------------------------------------
SUM: 85 3250 6086 11513
-------------------------------------------------------------------------------
$ find . -name '*.sol' | wc -l
72
$ find . -name '*.sol' | xargs wc -l
137 ./contracts/BaseJumpRateModelV2.sol
84 ./contracts/CarefulMath.sol
208 ./contracts/CDaiDelegate.sol
237 ./contracts/CErc20.sol
43 ./contracts/CErc20Delegate.sol
476 ./contracts/CErc20Delegator.sol
39 ./contracts/CErc20Immutable.sol
190 ./contracts/CEther.sol
...
53 ./contracts/Oracles/uniswapv2/IUniswapV2Pair.sol
179 ./contracts/Oracles/UniswapV2PriceOracle.sol
16 ./contracts/PriceOracle.sol
42 ./contracts/PriceOracleImplementation.sol
100 ./contracts/Reservoir.sol
186 ./contracts/SafeMath.sol
33 ./contracts/SimpleNftPriceOracle.sol
37 ./contracts/SimplePriceOracle.sol
110 ./contracts/Timelock.sol
148 ./contracts/Unitroller.sol
85 ./contracts/WhitePaperInterestRateModel.sol
19293 total
$ shasum -a 256 contracts/*.sol
32111c1b2bcdb051fa5c2564cd2a5e0662e699472ca5373499f67dca9c71cf47 contracts/BaseJumpRateModelV2.sol
c98ee33d13672016db21d4d6353b45eccb5c9f77499df77c254574a0481c0c03 contracts/CDaiDelegate.sol
fec5e373f98c6f178835fc6ef86bee04c765d8f87b264d7e3d6245dd835250ac contracts/CErc20.sol
9e4f5b92705c66f910bd0c38600bede344b592f1655a07e63a6ecfad45275a3b contracts/CErc20Delegate.sol
525e15dac623328c8c5cc9591be4fc7b5af85fdb96496ac3569201b63c26614b contracts/CErc20Delegator.sol
6689cb8083354cf98dcfc49d00274046a205696451ab6df13ef3c28285c39052 contracts/CErc20Immutable.sol
dc69e8e2a24e9f7239849fb2e8c0777a21ca96320f7e63b548a1bf544b939c4d contracts/CEther.sol
650bdf61c685b50b3f016553f822c35b4c605a0c477791b35f3de0a7cb61d390 contracts/CNft.sol
...
204a19fb7a661c5bafcd5f7916254a457ca1fd9104e5708a73dd5010b11353dc contracts/SafeMath.sol
37dd3c09e5343bc9ca1b62ba8b8d74ddadd2214123e3dcf102a4cb0d60f672bb contracts/SimpleNftPriceOracle.sol
d3bb4552a276f8063d85c5de8ac5431eea8a254226b2ca5964b0af4377bc4173 contracts/SimplePriceOracle.sol
ea4204fc8c5c72a5f4984177c209a16be5d538f1a3ee826744c901c21d27e382 contracts/Timelock.sol
a56f8cf884f0bceb918bbb078aaa5cd3ef90002323787729d70fdee6b4a1c602 contracts/Unitroller.sol
b5d06e0d725b01ecb8d0b88aa89300ddc0399904d84915a311f42f96970ba997 contracts/WhitePaperInterestRateModel.sol
$ egrep '\.\w*\(.*\)' contracts/* -nr
contracts/BaseJumpRateModelV2.sol:85: return borrows.mul(1e18).div(cash.add(borrows).sub(reserves));
contracts/BaseJumpRateModelV2.sol:99: return util.mul(multiplierPerBlock).div(1e18).add(baseRatePerBlock);
contracts/BaseJumpRateModelV2.sol:101: uint normalRate = kink.mul(multiplierPerBlock).div(1e18).add(baseRatePerBlock);
contracts/BaseJumpRateModelV2.sol:102: uint excessUtil = util.sub(kink);
contracts/BaseJumpRateModelV2.sol:103: return excessUtil.mul(jumpMultiplierPerBlock).div(1e18).add(normalRate);
contracts/BaseJumpRateModelV2.sol:116: uint oneMinusReserveFactor = uint(1e18).sub(reserveFactorMantissa);
contracts/BaseJumpRateModelV2.sol:118: uint rateToPool = borrowRate.mul(oneMinusReserveFactor).div(1e18);
...
contracts/Timelock.sol:64: bytes32 txHash = keccak256(abi.encode(target, value, signature, data, eta));
contracts/Timelock.sol:74: bytes32 txHash = keccak256(abi.encode(target, value, signature, data, eta));
contracts/Timelock.sol:83: bytes32 txHash = keccak256(abi.encode(target, value, signature, data, eta));
contracts/Timelock.sol:86: require(getBlockTimestamp() <= eta.add(GRACE_PERIOD), "Timelock::executeTransaction: Transaction is stale.");
contracts/Timelock.sol:95: callData = abi.encodePacked(bytes4(keccak256(bytes(signature))), data);
contracts/Timelock.sol:99: (bool success, bytes memory returnData) = target.call.value(value)(callData);
contracts/Unitroller.sol:137: (bool success, ) = comptrollerImplementation.delegatecall(msg.data);
contracts/WhitePaperInterestRateModel.sol:37: baseRatePerBlock = baseRatePerYear.div(blocksPerYear);
contracts/WhitePaperInterestRateModel.sol:38: multiplierPerBlock = multiplierPerYear.div(blocksPerYear);
contracts/WhitePaperInterestRateModel.sol:56: return borrows.mul(1e18).div(cash.add(borrows).sub(reserves));
contracts/WhitePaperInterestRateModel.sol:68: return ur.mul(multiplierPerBlock).div(1e18).add(baseRatePerBlock);
Some Platform here that you can do Smart Contracts audits and get large $ bounty.
- The Repository this list was largely sourced from
- Smart contract best pracitices
- Solidity idiosyncrasies
- Solidity security considerations
- Methodological security review of a smart contract
- Decentralized Application Security Project
- Ethereum Security Guide
- Smart Contract Security Verification Standard