Best Practices


Decentralized Finance (DeFi) is revolutionizing the finance industry and bringing boundless opportunities to the finance world. However, at the same time it has witnessed millions of funds being hacked. We believe it is critical for us to play a part to minimize such incidents as we place security as a top priority. With that, we have compiled a list of best practices to develop secure smart contracts for the Cronos ecosystem. This is by no means an exhaustive list but we believe it is a good foundation and minimum security baseline for any smart contract project.

Secure Coding Practices



  • The document about your contract should be recorded clearly, including the smart contract's purpose and what it can do. The document should be updated when you implement and update the contracts: Solidity contracts can use a particular form of comments to provide rich documentation for functions, return variables and more. This particular form is named the Ethereum Natural Language Specification Format NatSpec. You may refer to the Natspec format for more details. Schema and architectural diagrams, including the contract interactions and the state machine of the system. You may refer to Slither printers which can help you to generate your schemas.


  • For contract upgradeability, it is recommended to consider contract migration first, which will spare you the risks of an upgradeability mechanism but allows you to have the new functions.

  • You may refer to this contract migration guide for contract migration and the OpenZeppelin smart contracts upgrade guide for the contract upgrade. Also, remember to document the migration/upgrade procedure before the deployment.

On-chain vs Off-chain computation

  • Keep as much code as you can off-chain and keep the on-chain layer small. Pre-process data with code off-chain in such a way that verification on-chain is simple.

Development Implementation

Function Composition

  • Use simple solutions for your functions so that you and your team can understand when they review back. Also, the architecture of your codebase should make your code easy to check.

    • You may write small functions with a clear purpose. This helps facilitate a more straightforward review and testing.

    • You can split the logic of your system either through multiple contracts or by grouping similar functions.

    • You should also note that all state modification in the function must happen before an external call is made, when considering the function in Solidity. This potentially prevent a re-entrancy attack. You can learn more details here.


  • Keep the inheritance manageable. Even though inheritance should be used to divide the logic, your project should aim to minimize the depth and width of the inheritance tree. You may check out Slither’s inheritance printer to check the contracts’ hierarchy to help you review the size of the hierarchy.


  • For Solidity, use a stable release to compile and the latest release to check for warnings. Make sure your code has no reported issues with the latest compiler version. Also, stay cautious when using inline assembly, as it requires strong EVM expertise.

Events & Logging

  • Log all major operations. Events will help to debug the contract during the development and monitor it after deployment.


  • For dependencies, you would want to use well-tested libraries to reduce the chance of buggy code. You may consider using a dependency manager. If you rely on an external source, you should keep it up-to-date with the original source.

Common Security Issues

  • Be aware of the most common security issues and keep an eye on the warnings and updates from the Solidity documentation.


  • Static analysis tools are an important toolkit for smart contract auditors. These tools are automated, and hence saves time and improves quality as it helps to discover potential common vulnerabilities in your code. Below are some examples of some tools widely used:

    • Slither runs a suite of vulnerability detectors, prints visual information about contract details, and provides an API to easily write custom analyses. Slither enables developers to find vulnerabilities, enhance their code comprehension, and quickly prototype custom analyses.

    • Mythril is a security analysis tool for EVM bytecode. It detects security vulnerabilities in smart contracts built for Ethereum. It uses symbolic execution, SMT solving and taint analysis to detect a variety of security vulnerabilities.

    • Echidna is a smart contract fuzzing tool. Fuzzing is an automated testing technique that randomly feeds invalid and unexpected inputs and data into smart contracts in order to find coding errors and security vulnerabilities. Echidna uses grammar based fuzzing based on an EVM ABI to falsify user-defined predicates or Solidity assertions.

  • Testing is important, but more importantly, tests should be automated and have consistently run results. Tests find bugs and vulnerabilities easier, quicker and ensure it meets the functional requirements the smart contracts promised to deliver i.e. verification.

    • Ensure there is sufficient coverage of smart contracts, specifically on those with complex business logic.

    • Ensure deployment on mainnet is after the test suite passes.

    • Ensure testing is part of continuous integration (CI). Ideally, anyone can see the test result/execution from a repository like github.

    • Ensure anyone can checkout the repository and run the test without any additional setup.

    • Ensure writing through unit tests. An extensive test suite is crucial to build high-quality software.

    • Need to know more about testing


  • Smart contract code must be viewable from Cronos explorer.

  • Ideally, each release of smart contracts should be trackable from repositories like github, e.g. using tagging features of github.

  • Study and review against smart contracts development best practices.

  • Monitor your contracts. Watch the logs, and be ready to react in case of contract or wallet compromise.

  • Have a contingency plan for incidents: an attacker may take control of the contract owner's keys even if your contracts are free of bugs.

The above section is based on the Building Secure Smart Contracts guide, credit to the Trail of Bits team.

Security Audit

  • Important to have at least one independent external security team to review smart contracts. The intent of this is for experts to review the code, test the overall quality and find subtle smart contract weaknesses that could be exploited by attackers.

  • This is not a one-off exercise, it must be a continuous effort as the smart contracts are being re-factored for cases where it is upgradeable.

  • Ideally an external security audit is conducted before deployment of smart contracts to the mainnet.

  • Ideally, a report from an external security audit team should be made available publicly as this can provide investors and users of the DeFi project to understand the quality and safety of the smart contracts.

DeFi Administrator Operation

  • Proper key management

    • Using hardware wallets for privileged users or administrators of smart contracts. Recently, a DeFi project bZx has been hacked due to the administrator's private key being leaked. The private key was leaked because the administrator was a target of a phishing attack resulting in the user’s wallet mnemonic being compromised. To learn how to properly use a hardware wallet refer to this.

    • Use timelock for smart contract changes. There are standards such as one provided by OpenZeppelin for a transaction delay/cancel/other control authority. Related use issue check can refer to this link.

    • Use multisignature to avoid a single point (owner) of failure (lose/compromise private key).

    • Ownership management - it is unavoidable in some cases, actions in smart contracts need to be controlled by administrators. In such cases, it is advised to use proven open source libraries such as OpenZeppelin - Access.

  • Clearly document the control or access available to issuers or owners of smart contracts in plain English. A good example please refer to this link

  • Refrain from having owners/issuers to have permission to transfer user’s funds.

Bug Bounty

  • Bug bounty program is a complement to security audit in which it allows ethical hackers to identify and disclose potential vulnerabilities in deployed smart contracts. Typically bug bounty attracts diverse and experienced talents.

  • If an ethical hacker discovers a vulnerability, it is reported with severity and details in the bug bounty platform. This information is received by DeFi project selected developers who can check for the validity of the report. If it is a valid vulnerability, the DeFi project developers will patch it and test that the patch works. The DeFi project then pays out a bounty to the ethical hacker. The amount of the bounty typically depends on the severity and the impact of it.

  • Bug bounty for smart contracts could easily be set up by the DeFi project on platforms such as Immunefi.

Security Policy

  • For DeFi projects without bug bounty programs, it is recommended to have a publicly accessible security policy.

  • The security policy may describe the scope of the project and how the project processes vulnerability reports submitted by ethical hackers. It should also outline the assets in/out scope and the do/don’t for ethical hackers.

  • The security policy is important as it allows ethical hackers to disclose vulnerabilities securely with the right team. From the ethical hackers perspective, the security policy is a clear message from the project that they will not be prosecuted if vulnerabilities are reported and has been tested in accordance with rules governed in security policy.

  • You could also use to generate a basic security policy.

  • An example of a good DeFi project security policy:

Latest Hacks

  • Keep abreast with all hacks in smart contracts across EVM compatible blockchains. Some sources of news of hacks as follow:

  • Encouraged developers to learn from each hack and compile lessons learned from each of it, and to assess if there are any risks to your own respective projects

Last updated