Awesome EVM Security

Mirror of https://github.com/kareniel/awesome-evm-security#readme

An overview of the EVM ecosystem from an information security management perspective.

Contents

Governance

Architecture

Standards

  • DeFi Safety - Best practices security score reviews.
  • DASP Top 10 of 2018 - Decentralized Application Security Project Top 10 vulnerabilities.
  • IVSCS - Immunefi Vulnerability Severity Classification System.
  • Smart Contract Security Verification Standard - A free 14-part checklist created to standardize the security of smart contracts for developers, architects, security reviewers and vendors.
  • Secureth guidelines - Aid you in formulating your own software engineering process by giving a complete picture of all the different concerns and expectations in your software projects.
  • CryptoCurrency Security Standard (CCSS) - A set of requirements for all information systems that make use of cryptocurrencies, including exchanges, web applications, and cryptocurrency storage solutions.
  • The Solcurity Standard - Opinionated security and code quality standard for Solidity smart contracts.

Assets

Threats

  • Blockchain Graveyard - A list of all massive security breaches or thefts involving blockchains.
  • List of Bitcoin Heists - Research on prior Bitcoin-related thefts.
  • Blockchain Threat Intelligence - The latest in blockchain, DeFi and cryptocurrency threat intelligence, vulnerabilities, security tools, and events.
  • Rekt News - Investigative journalism, creative commentary, and incident analysis.
  • DeFiYield's REKT db - Database of Crypto Hacks, Exploit, Scam.
  • CryptoScamDB - Keeping track of cryptocurrency scams in an open-source database.
  • Mudit Gupta's Twitter threads - Early analysis and educational content on Twitter.
  • Flash Boys 2.0 Paper - Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.
  • MEV-explore - Help the community understand and quantify the significance of "Dark Forest activities" and their impact on the Ethereum network.
  • Flashloan monitor - Dashboard that helps you monitor flashloan transactions.
  • Known Attacks - A list of known attacks which you should be aware of, from Consensys.
  • Solidity Security - Comprehensive list of known attack vectors and common anti-patterns.

Vulnerabilities

Controls

Guides

Ecosystem

Footnotes

See Also

Other Awesome Lists:

I hope you found this valuable

I send out an e-mail whenever I publish new content. It's free. No spam. Unsubscribe whenever you want.