Blog

Checkout Smart Contracts Security Audit Scope

Table of Contents

Read Time: 3 minutes

Our Smart Contracts Security Audit process consists of the following stages:-

Stage 1 – Specification gathering

This is the most crucial stage because the detail is key for a successful smart contract Security audit. Here we will gather the specifications from you to know the intended behavior of smart contract. In this stage, we need a summary of the intended behavior of the smart contract from your side. We would also gather specification through forms.

You can provide specification summary in the form of example image attached below:-

Stage 2 – Manual Review

Manual Review is king in smart contract auditing

Goals of manual review:-

a.) Verify that every detail in the specification is implemented in smart contract.

b.) Verify that the contract does not have any behavior that is not specified in specifications.

c.) Verify that contract does not violate original intended behavior of specifications.

Here we would look for undefined, unexpected behavior and common security vulnerabilities like:-

=> Re-entrance
=> Overflows
=> Uncheck return values for low-level calls.
=> Denial of service
=> Bad randomness
=> Front running
=> Time manipulation
=> Short address attack
=> Unknown vulnerabilities

In manual review more that one auditor will review the code. The goal is to get to as many skilled eyes on contract code as possible.

Also, Read Our Next Article on QuillAudits.

=> We will apply all security attacks known till date on your contract manually to find security vulnerabilities

=> We will also ensure that your contract has some mechanism to defend against unknown vulnerabilities. Because the state of ethereum is constantly changing and we cannot say which vulnerabilities will arise in the future so we must have a mechanism beforehand.

=> We would ensure that smart contract code must respond to bugs and vulnerabilities well.

=> Manual testing will be done on test nets like rinkeby and ropsten.

=> We would also ensure that there is no unnecessary code in the contract.

=> Best code practices will also be considered in this phase.

Stage 3 – Unit testing

Goal:-Writing and running a comprehensive test suite.

=> In this stage smart contract functions will be unit tested on multiple parameters and under multiple conditions to ensure that all paths of functions are functioning as intended.

=> In this phase intended behavior of smart contract is verified.

=> In this phase, we would also ensure that smart contract functions are not consuming unnecessary gas.

=> Gas limits of functions will be verified in this stage.

Stage 4 – Testing with automated tools

=> Testing with automated tools is important to catch those bugs that humans miss.

Some of the tools we would use are:-
Mythril
Oyente
Manticore
Solgraph
Solidity-coverage

At the end, we would provide you a comprehensive report along with details of audit and steps to cover up with the vulnerabilities if we found any in your contracts.

Launch your blockchain project with Quillhash: https://quillhash.typeform.com/to/KQ5Hhm

Thanks for reading. Also, do check out our earlier blog posts.


At QuillHash, we understand the Potential of Blockchain and have a good team of developers who can develop any blockchain applications like Smart Contracts, dApps,Smart Coins, DeFi, DEX on the any Blockchain Platform like EthereumEOS and Hyperledger.

To be up to date with our work, Join Our Community :-

Telegram | Twitter | Facebook | LinkedIn

1,410 Views

Related Articles

View All

Trending

#Alert🚨
$NUWA failed to rug on BSC and was front-run by the MEV bot 0x286E09932B8D096cbA3423d12965042736b8F850.

The bot made ~$110,000 in profit.

Are you concerned about your enterprise's security in Web 3.0? Look no further!

Let's delve deeper into and learn effective solutions to mitigate them. Our experts have covered unconventional approaches, from Zero- Trust Security Model to Bug Bounty Programmes.

🔻🔻🔻

Hey folks👋,

Web3 security is like a game of whack-a-mole, except the moles are hackers who keep popping up no matter how hard you hit them. 🤦‍♀️

But fear not; we've got some tips to keep your crypto safe⬇️⬇️

Unlock the power of Web3 for your enterprise with enhanced security measures!

💪🌐 Our latest blog post delves into the world of Web3-powered enterprises and how to ensure maximum security in this new frontier.🔒

Read part 1 of our series now: 🚀https://blog.quillhash.com/2023/03/15/web3-security-for-enterprise-web3-powered-enterprises-part-1/

#Web3… https://twitter.com/i/web/status/1638154504154628096

Load More

Amidst FTX Saga, Hacker Swept More Than $25 Million in 2nd week of November

The contract reinvested (the earn function was not called) before the user pledged (depositAll function) without settling the reward, which means that when the user pledged, the contract did not settle the previous reward and instead conducted a new investment.

Become a Quiffiliate!
Join our mission to safeguard web3

Sounds Interesting, Right? All you have to do is:

1

Refer QuillAudits to Web3 projects for audits.

2

Earn rewards as we conclude the audits.

3

Thereby help us Secure web3 ecosystem.

Total Rewards Shared Out: $190K+