Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-evm-security
🕶 A high-level overview of the EVM security ecosystem
https://github.com/kareniel/awesome-evm-security
Last synced: 4 days ago
JSON representation
-
Guides
- CryptoSec.info - Information to help beginners learn how to protect their funds against hackers and scammers.
- Simplified Roadmap for Blockchain Security - Covers all rudimentary topics that one needs to know in order to get into the field of Blockchain Security.
-
Governance
- A beginner's guide to DAOs - Gives a high level overview of what DAOs are, why they are interesting and some of their use cases.
- Deep DAO - Lists, ranks and analyzes top DAOs across multiple metrics.
- SAFT Agreements - A commercial instrument used to convey rights in tokens prior to the development of the tokens' functionality.
- Voting Options in DAOs - Voting Options in DAOs.
- The Wyoming DAO bill - A thread about Wyoming DAOs .
- It Takes a Cryptonetwork - Prime's Strategy for DAO to DAO Relations.
- DAOs, Democracy and Governance - A paper by Ralph Merkle about DAOs.
-
Architecture
- Foundations of Cryptoeconomic Systems - This paper explores why the term
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- A Crash Course in Mechanism Design for Cryptoeconomic Applications - Introduces the basic concepts of mechanism design, and gives a taste for their usefulness in the cryptocurrency world.
- WTF Is QF - A simple explanation of quadratic funding.
- Bonding Curves Explained - What bonding curves are and their potential applications.
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Foundations of Cryptoeconomic Systems - This paper explores why the term
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Shelling Out: The Origins of Money - Illustrates the value of collectibles in reducing social transaction costs.
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- Shelling Out: The Origins of Money - Illustrates the value of collectibles in reducing social transaction costs.
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
-
Standards
- DeFi Safety - Best practices security score reviews.
- DASP Top 10 of 2018 - Decentralized Application Security Project Top 10 vulnerabilities.
- IVSCS - Immunefi Vulnerability Severity Classification System.
- Secureth guidelines - Aid you in formulating your own software engineering process by giving a complete picture of all the different concerns and expectations in your software projects.
- The Solcurity Standard - Opinionated security and code quality standard for Solidity smart contracts.
- Smart Contract Security Verification Standard - A free 14-part checklist created to standardize the security of smart contracts for developers, architects, security reviewers and vendors.
- CryptoCurrency Security Standard (CCSS) - A set of requirements for all information systems that make use of cryptocurrencies, including exchanges, web applications, and cryptocurrency storage solutions.
- The Solcurity Standard - Opinionated security and code quality standard for Solidity smart contracts.
- The Solcurity Standard - Opinionated security and code quality standard for Solidity smart contracts.
-
System Assets
- Security Considerations in the Solidity documentation - Lists some pitfalls and general security recommendations.
- Ethereum 2.0 Specifications Security Audit Report - Security Audit Report of the Eth2.0 spec by Least Authority.
- Getting Deep Into EVM - An Ultimate, In-depth Explanation of How EVM Works.
- Ethereum EVM illustrated - Exploring some mental models and implementations.
- Ethereum Blockspace: Who Gets What and Why - Ethereum blockspace market structure.
- What Is Uniswap and How Does It Work? - What Uniswap is, how it works, and how you can swap tokens on it simply with an Ethereum wallet.
- Scaling EVM (Ethereum Virtual Machine) - How fast and far can the EVM based blockchain architecture still take us.
- L2Beat - Transparent and verifiable insights into emerging layer two (L2) technologies.
- The Non-Fungible Token Bible - Everything you need to know about NFTs.
- KEVM - A formal model of the EVM in the K framework.
- KEVM - A formal model of the EVM in the K framework.
- Getting Deep Into EVM - An Ultimate, In-depth Explanation of How EVM Works.
- The Non-Fungible Token Bible - Everything you need to know about NFTs.
-
Threats
- List of Bitcoin Heists - Research on prior Bitcoin-related thefts.
- Blockchain Threat Intelligence - The latest in blockchain, DeFi and cryptocurrency threat intelligence, vulnerabilities, security tools, and events.
- Rekt News - Investigative journalism, creative commentary, and incident analysis.
- DeFiYield's REKT db - Database of Crypto Hacks, Exploit, Scam.
- CryptoScamDB - Keeping track of cryptocurrency scams in an open-source database.
- Mudit Gupta's Twitter threads - Early analysis and educational content on Twitter.
- Flash Boys 2.0 Paper - Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.
- MEV-explore - Help the community understand and quantify the significance of "Dark Forest activities" and their impact on the Ethereum network.
- Flashloan monitor - Dashboard that helps you monitor flashloan transactions.
- Known Attacks - A list of known attacks which you should be aware of, from Consensys.
- Solidity Security - Comprehensive list of known attack vectors and common anti-patterns.
- Blockchain Graveyard - A list of all massive security breaches or thefts involving blockchains.
-
Vulnerabilities
- SWC Registry - Smart Contract Weakness Classification and Test Cases.
- 246 Findings - 246 Findings From Trail of Bits Smart Contract Audits.
- A Survey of Security Vulnerabilities in Ethereum Smart Contracts - Explains eight vulnerabilities that are specific to the application level of blockchain technology by analyzing the past exploitation case scenarios of these security vulnerabilities.
- List of Security Vulnerabilities - A comprehensive list of common smart contract security vulnerabilities, compiled from various sources.
- List of Known Bugs - A JSON-formatted list of some of the known security-relevant bugs in the Solidity compiler.
- A Survey of Security Vulnerabilities in Ethereum Smart Contracts - Explains eight vulnerabilities that are specific to the application level of blockchain technology by analyzing the past exploitation case scenarios of these security vulnerabilities.
-
Controls
- Gnosis Safe - Multi-sig. Require multiple team members to confirm every transaction in order to execute it, which helps prevent unauthorized access to company crypto.
- List of DeFi auditors - List of DeFi auditors maintained by DeFiSafety.
- State of DeFi Audits - Article taking a look at the auditing space and its importance in onboarding users by properly securing new DeFi protocols.
- Security Pattern for Ethereum and Solidity - Google Sheets Checklists.
- Solidity Best Practices for Smart Contract Security - Pro tips from Consensys to ensure your Ethereum smart contracts are fortified.
- CERtified - Top 100 exchanges by Cybersecurity rating.
- Forta - Community-based runtime security network for smart contracts.
- Simple Security Toolkit - Opinionated recommendations that the team at Nascent find to be appropriate, particularly for teams developing and managing early versions of a protocol.
- Building Secure Contracts - Trail of Bits' guidelines and best practices on how to write secure smart contracts.
- Solidity Patterns - A compilation of patterns and best practices for the smart contract programming language Solidity.
- Smart Contract Security Registry - An effort to identify deployed contracts instances given their chain and address, by listing the project they belong to.
- Gnosis Safe - Multi-sig. Require multiple team members to confirm every transaction in order to execute it, which helps prevent unauthorized access to company crypto.
-
Ecosystem
- People to follow on Twitter - Twitter list to an overview of the web3 ecosystem and security people.
- Videos to watch on YouTube - YouTube playlist of web3 security videos.
- Videos to watch on YouTube - YouTube playlist of web3 security videos.
-
Footnotes
-
See Also
- Awesome BlockSec CTF - Blockchain security Capture the Flag (CTF) competitions.
- Awesome Buggy ERC20 Tokens - Vulnerabilities in ERC20 Smart Contracts With Tokens Affected.
- Awesome Cryptoeconomics - Cryptoeconomic research and learning materials.
- Awesome Zero-Knowledge Proofs (ZKP) - A curated list of awesome things related to learning Zero-Knowledge Proofs (ZKP).
- Officer CIA's Ultimate DeFi Research Base - Curated DeFI & Blockchain research papers and tools.
- Awesome MEV resources
-
Programming Languages
Categories
Sub Categories
Keywords
ethereum
3
smart-contracts
3
solidity
3
bitcoin
2
blockchain
2
awesome-list
2
awesome
2
security
2
solidity-patterns
1
solidity-language
1
smart-contract
1
dapp
1
erc20
1
erc20-tokens
1
security-tools
1
tokens
1
vulnerabilities
1
crypto
1
casper
1
consensus
1
cryptoeconomics
1
game-theory
1
pos
1
explaining-snarks
1
knowledge-proofs
1
snark
1
team-crypto
1
zk-snarks
1
blockchain-technology
1
cryptocurrency
1
curated-list
1
defi
1
knowledge-base
1
research
1