02

    Smart Contract Security

    Smart contracts are the onchain components of Ethereum applications: the code that holds funds, defines access controls, and enforces the application's business logic. Because smart contracts are typically transparent and accessible to anyone, they are a critical attack surface when considering security in the Ethereum ecosystem.

    Overview

    Smart contracts are the onchain components of Ethereum applications: the code that holds funds, defines access controls, and enforces the application's business logic. Because smart contracts are typically transparent and accessible to anyone, they are a critical attack surface when considering security in the Ethereum ecosystem.

    02.1

    Contract vulnerabilities

    Smart contracts operate in a fully adversarial environment where logic errors, privileged roles, and upgrade mechanisms can be exploited long after deployment. While audits reduce risk, real-world failures show that continuous adversarial pressure and standardized defenses are critical.

    STRENGTHS

    Formal verification in live production

    Mathematical verification is used on real, high-value contracts, not just research examples.

    Large-scale, coordinated bug bounties

    Continuous, adversarial testing is provided by a global researcher community incentivized at scale.

    Continuous adversarial testing at ecosystem scale

    Live smart contracts are continuously tested by a large, incentivized global researcher community, providing sustained adversarial pressure beyond audits or internal review.

    RISKS

    Insufficient or incorrectly implemented access control in smart contracts allows unauthorized execution of privileged actions. Audit coverage and role hygiene have improved, but access-control bugs remain a leading cause of losses.

    Incomplete invariant enforcement and unsafe state transitions allow contracts to enter exploitable states. Formal methods and fuzzing are improving, but coverage remains uneven.

    Weak oracle design or economic parameterization enables price manipulation and economic exploits. TWAPs and circuit breakers are more common, yet manipulation risk persists.

    Insufficient adoption of Oracle manipulation safeguards increases the likelihood and impact of security incidents in this domain.

    02.2

    Developer experience & tooling

    Smart contract development requires managing correctness, safety, and upgradeability under adversarial conditions. While tooling has matured significantly, effective security depends on how consistently safeguards are embedded into default development workflows.

    STRENGTHS

    Compiler-embedded safety improvements

    Solidity embeds warnings and ABI safety improvements that eliminate entire bug classes before deployment.

    Source verification as a default norm

    Deployed contracts are routinely matched to published source code, enabling inspection, simulation, and tooling at scale.

    Standardized libraries remove common vulnerability classes

    Widely reused smart contract libraries and proxy standards encode safe patterns that eliminate entire classes of known vulnerabilities and make deviations easier to detect.

    RISKS

    Custom security modules (circuit breakers, recovery mechanisms) get rewritten per team, introducing latent bugs. Formal verification remains niche outside top-tier protocols.

    Source verification and audit attestations are still manual, so users can't easily confirm the code they're using matches what was reviewed.

    02.3

    Risk assessment of onchain code

    Assessing smart contract risk requires understanding immutable logic, privileged access, and composability rather than relying on traditional compliance checklists. Clear, ecosystem-native signals are needed to help users and integrators reason about onchain risk.

    STRENGTHS

    Verified Source Code as a Norm

    Ethereum has a strong norm of verified contracts and reproducible bytecode, enabling public inspection, simulation, and automated risk analysis at scale.

    Mature Auditing and Disclosure Ecosystem

    Ethereum has a mature audit and research community that publishes findings, postmortems, and disclosures, strengthening shared understanding of smart contract risk.

    Growing Monitoring and Risk Tooling

    Onchain monitoring, alerting, and risk analytics tools provide continuous signals about contract behavior, improving detection of anomalies and informed integration.

    RISKS

    Inadequate threat modeling, testing, and independent review of on-chain code leaves critical vulnerabilities undiscovered prior to deployment.

    Regulatory demands for kill switches clash with immutability. MiCA compliance (fully applicable Dec 2024) creates friction.