Development Workflow
Check for known security issues:
Review your contracts with Slither. It has more than 70 built-in detectors for common vulnerabilities. Run it on every check-in with new code and ensure it gets a clean report (or use triage mode to silence certain issues).
Consider special features of your contract:
Are your contracts upgradeable? Review your upgradeability code for flaws with
slither-check-upgradeability
or Crytic. We've documented 17 ways upgrades can go sideways.Do your contracts purport to conform to ERCs? Check them with
slither-check-erc
. This tool instantly identifies deviations from six common specs.Do you have unit tests in Truffle? Enrich them with
slither-prop
. It automatically generates a robust suite of security properties for features of ERC20 based on your specific code.Do you integrate with 3rd party tokens? Review our token integration checklist before relying on external contracts.
Visually inspect critical security features of your code:
Review Slither's inheritance-graph printer. Avoid inadvertent shadowing and C3 linearization issues.
Review Slither's function-summary printer. It reports function visibility and access controls.
Review Slither's vars-and-auth printer. It reports access controls on state variables.
Document critical security properties and use automated test generators to evaluate them:
Learn to document security properties for your code. It's tough as first, but it's the single most important activity for achieving a good outcome. It's also a prerequisite for using any of the advanced techniques in this tutorial.
Define security properties with Slither's Python API. Focus on inheritance, variable dependencies, access controls, and other structural issues.
Finally, be mindful of issues that automated tools cannot easily find:
Lack of privacy: everyone else can see your transactions while they're queued in the pool
Front running transactions
Cryptographic operations
Risky interactions with external DeFi components
Last updated