Back to blogs
Written by
Hans
Published on
April 7, 2025

Solodit Checklist Explained (0): Preface

Explore the Solodit Checklist to build secure smart contracts. Learn practical tips, code analysis, and real-world insights to strengthen your blockchain projects.

Table of Contents

Welcome to "Solodit Checklist Explained", your no-nonsense guide to navigating the complex world of smart contract security. As some of you may know from my previous ventures, the Solodit checklist isn't just theory to me – it's a practical tool that's helped me achieve real results. Now, I want to share that power with you. We're diving deep into the comprehensive Solodit security checklist to dissect it, understand it, and equip you to build smart contracts that are not just functional but robust and secure.

Security isn't simply about avoiding disasters. It's about building confidence. It's about developing a critical eye, spotting potential weaknesses before they become exploitable. Think of it as a high-stakes chess game, anticipating threats before they materialize and planning defensively. That’s exactly what we’ll do using the Solodit checklist as our blueprint.

The "treasure map", the actual checklist, lives here. It's a substantial JSON file containing roughly 380 individual checks (and counting). Don't let that number intimidate you! Think of it as a highly detailed specification sheet rather than a daunting list of tasks. We'll break it down into manageable, actionable steps, focusing on the why behind each item.

Why this matters: real-world impact and personal experience

From my experience winning contests, I've learned that understanding smart contract security deeply is a significant advantage. So, the checklist isn't abstract. It's a proven path to avoiding costly mistakes that can impact your time, money, and reputation. It is a pathway to a more profound appreciation of smart contract security.

Decentralized Finance (DeFi) evolves rapidly. New technologies emerge constantly, and attack vectors evolve, too. If you don’t understand the common pitfalls, you're playing a risky game. Consider this series your constant companion as you learn and build. By the end, you'll have a strong foundation for approaching smart contract security challenges.

Checklists are invaluable in the chaotic world of smart contract development and review. They:

  • Help you catch the sneaky bugs that would've slipped past your tired eyes at 2 AM.
  • Establish a consistent "way of doing things" across your team.
  • Provide a perfect crash course for newbies joining your project mid-flight.
  • Create a living document that evolves and improves with experience.

Yet, a checklist isn't going to solve all your problems. Moreover, maintaining a good checklist demands time and attention. Even the most epic checklist can't anticipate every bizarre edge case that might surprise you. 

Our method: cultivating a security-first mindset

Our approach centers on cultivating a security-first mindset.

We'll be unpacking the "why" behind each item in the checklist, providing the context and understanding you need to truly understand the potential risks and, more importantly, how to mitigate them. Each article will focus on exploring three to five related items. Here's what you can expect:

  • Deep dive into core concepts: We'll break down the underlying security concepts related to each item, often using examples of real-world exploits where a lack of awareness led to disaster. We’ll examine fundamental concepts such as front-running, reentrancy, and donation attacks. For example, when discussing reentrancy, we'll look at why it matters as we explore how multiple external calls can cause unexpected contract state changes impacting the stability and security of the contract.
  • Hands-on code analysis and practical examples: We'll analyze concise, targeted Solidity code snippets to demonstrate secure coding patterns and highlight common vulnerabilities related to specific checklist items. We'll show vulnerable code patterns and break down scenarios from competitions or other hacks, demonstrating how attacks unfold in practice. To further solidify your understanding, we'll provide working examples demonstrating each checklist item, alongside Proof-of-Concept (PoC) exploits written in Foundry. All examples will be available at solodit-checklist-blog-examples.
  • Connecting theory to reality: Each article will link specific checklist items to documented vulnerabilities and/or competition findings. We'll bridge the gap between theoretical knowledge and practical application by examining how these vulnerabilities have been exploited in the real world.

The value you'll gain

By the end of this series, you'll:

  • Master the Solodit Checklist: You'll have a deep and practical understanding of every item on the checklist, enabling you to implement them in your projects effectively.
  • Think like an auditor: You'll develop a security-first mindset, allowing you to identify potential vulnerabilities before they can be exploited. This involves not just knowing the checklist items but also understanding their implications and how they interconnect.
  • Write secure code: You'll learn how to write, audit, and test secure smart contracts using industry-standard tools and techniques.
  • Gain a competitive advantage: In a space where security is paramount, you'll stand out as a knowledgeable and security-conscious developer. Mastering these security practices will better position you to contribute to high-profile projects and win security contests.
  • Contribute to a safer ecosystem: The more secure our contracts, the more trustworthy the entire decentralized world becomes. Every secure contract you deploy adds to the overall robustness of the blockchain ecosystem.

This isn't just about learning. It's about doing. It's about transforming theory into practice, vulnerabilities into lessons, and risks into robust security measures.

So, grab your favorite beverage, and get ready to dive in. Next time, we're starting with our first category: Attacker's Mindset / Denial-of-Service (DoS) Attack.

Stay vigilant, stay curious, and let's build a more secure future together!

Secure your protocol today

Join some of the biggest protocols and companies in creating a better internet. Our security researchers will help you throughout the whole process.
Stay on the bleeding edge of security
Carefully crafted, short smart contract security tips and news freshly delivered every week.