secure-workflow-guide

Installation
Summary

Smart contract security review through Trail of Bits' 5-step workflow with automated scanning, visual analysis, and property documentation.

  • Runs Slither with 70+ detectors to identify known vulnerabilities, then checks for special features like upgradeability risks, ERC conformance, and token integration patterns
  • Generates three security diagrams (inheritance graph, function visibility, state variable authorization) to reveal architectural vulnerabilities that text descriptions miss
  • Guides documentation of critical security properties (state machines, access control, arithmetic constraints) and sets up property-based fuzzing with Echidna or formal verification with Manticore
  • Analyzes manual review areas automated tools miss: privacy leaks, front-running risks, cryptography weaknesses, and DeFi interaction hazards with codebase pattern matching
SKILL.md

Secure Workflow Guide

Purpose

Guides through Trail of Bits' secure development workflow - a 5-step process to enhance smart contract security throughout development.

Use this: On every check-in, before deployment, or when you want a security review


The 5-Step Workflow

Covers a security workflow including:

Step 1: Check for Known Security Issues

Run Slither with 70+ built-in detectors to find common vulnerabilities:

  • Parse findings by severity
  • Explain each issue with file references
  • Recommend fixes
Related skills
Installs
3.4K
GitHub Stars
5.1K
First Seen
Jan 19, 2026