Guidelines, best practices, and training material for writing secure smart contracts across multiple blockchain platforms.
Building Secure Smart Contracts is an open-source repository of guidelines, best practices, and training materials for developing secure smart contracts across multiple blockchain platforms. It provides developers with the knowledge and tools needed to prevent common vulnerabilities and build robust decentralized applications. The resource covers everything from high-level development workflows to technical EVM details and hands-on exercises with security analysis tools.
Smart contract developers, blockchain security engineers, and auditors who need practical guidance and training materials for writing secure code across Ethereum, EVM-compatible chains, and other blockchain platforms.
Developers choose this resource because it offers comprehensive, multi-chain security guidance from industry experts at Trail of Bits, combines theoretical knowledge with practical exercises, and covers both established and emerging blockchain platforms with real vulnerability examples.
Guidelines and training material to write secure smart contracts
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Provides real-world examples of common issues across platforms like Solana, Sui, and Algorand in the 'Not So Smart Contracts' section, helping developers learn from practical cases.
Includes exercises for security tools like Echidna and Slither, with each session taking approximately two hours, as detailed in the 'Program Analysis' section for practical skill-building.
Created by Trail of Bits, it offers industry-tested best practices, incident response plans, and secure development workflows, ensuring reliable security insights.
Covers EVM opcodes, transaction tracing, and arithmetic checks in depth, as seen in the 'Learn EVM' section, aiding low-level understanding and debugging.
The material is extensive, with exercises that require hours to complete, making it less suitable for rapid onboarding or quick reference use.
Licensed under AGPLv3, which may require contacting for exceptions, potentially complicating commercial adoption and integration into proprietary workflows.
Focuses primarily on Trail of Bits' tools like Echidna and Slither, omitting other popular security analysis tools available in the broader ecosystem.