Hashtag Web3 Logo

50 Portfolio Project Ideas for Smart Contract Auditors

As a smart contract auditor, your portfolio needs to demonstrate deep security expertise and practical experience finding vulnerabilities. These project ideas will help you build credibility with protocols and audit firms.

For: smart contract auditorUpdated: March 13, 2026

Vulnerability Research Projects

Document and analyze real-world exploits to demonstrate your understanding of attack vectors.

Exploit Post-Mortem Database

intermediate3-4 weeks

Create a searchable database of DeFi exploits with technical breakdowns, root cause analysis, and prevention strategies for each incident.

ResearchTechnical WritingSolidity

Reentrancy Pattern Catalog

intermediate2 weeks

Build a comprehensive catalog of reentrancy variations including cross-function, cross-contract, and read-only reentrancy with code examples.

SoliditySecurity PatternsDocumentation

Flash Loan Attack Simulator

advanced4-6 weeks

Develop a tool that simulates flash loan attacks against test contracts to demonstrate various manipulation techniques.

SolidityDeFiFoundryFlash Loans

Oracle Manipulation Lab

advanced3-4 weeks

Create a testing environment demonstrating price oracle attacks including TWAP manipulation and spot price attacks.

DeFiOraclesFoundryMEV

Access Control Vulnerability Scanner

advanced4-5 weeks

Build a static analysis tool that detects common access control issues like missing modifiers and privilege escalation paths.

PythonAST ParsingSoliditySecurity

Security Tooling Projects

Build tools that automate or assist the audit process.

Custom Slither Detectors

advanced2-3 weeks

Write custom Slither detectors for vulnerability patterns not covered by default rules, such as protocol-specific issues.

PythonSlitherStatic AnalysisSolidity

Foundry Fuzzing Framework

advanced4-6 weeks

Create a reusable fuzzing framework with invariant tests for common DeFi primitives like AMMs, lending, and vaults.

FoundryFuzzingDeFiInvariants

Gas Griefing Detector

intermediate2 weeks

Build a tool that identifies potential gas griefing vulnerabilities in contracts with unbounded loops or external calls.

Static AnalysisEVMGas Mechanics

Upgrade Safety Checker

advanced3-4 weeks

Develop a tool that validates proxy upgrade safety by checking storage layout compatibility and initialization patterns.

ProxiesStorage LayoutSolidityPython

MEV Vulnerability Scanner

advanced4-5 weeks

Create a scanner that identifies sandwich attack and frontrunning vulnerabilities in DeFi contracts.

MEVDeFiTransaction AnalysisSolidity

CTF and Educational Content

Create learning resources that demonstrate your teaching ability and deep understanding.

Custom CTF Challenge Set

intermediate3-4 weeks

Design a series of increasingly difficult smart contract CTF challenges covering various vulnerability classes.

SoliditySecurityEducationGame Design

Damn Vulnerable DeFi Solutions Guide

intermediate2-3 weeks

Write detailed walkthroughs for Damn Vulnerable DeFi challenges explaining the thought process and multiple solution approaches.

Technical WritingDeFi SecuritySolidity

Security Pattern Cheatsheet

beginner1-2 weeks

Create a visual cheatsheet of security patterns and anti-patterns with code examples and real exploit references.

DesignDocumentationSecurity

Audit Report Template Library

intermediate2 weeks

Develop a library of audit report templates with standardized vulnerability descriptions and severity classifications.

Technical WritingDocumentationSecurity

Video Audit Walkthrough Series

intermediate4-6 weeks

Record video walkthroughs of your audit process on open-source contracts, explaining your methodology.

Video ProductionCommunicationAudit Process

Real Protocol Analysis

Analyze live protocols to demonstrate real-world auditing skills.

Public Audit of Small Protocol

advanced2-4 weeks

Conduct a thorough public audit of a smaller protocol's contracts and publish your findings responsibly.

Full Audit ProcessReport WritingCommunication

Protocol Comparison Analysis

advanced3-4 weeks

Compare the security architecture of similar protocols (e.g., Aave vs Compound) highlighting design tradeoffs.

Protocol AnalysisDeFiResearchWriting

Bug Bounty Hunting Documentation

advancedOngoing

Document your bug bounty hunting process and findings (with permission) to show real vulnerability discovery.

Bug HuntingResearchWriting

Governance Attack Analysis

advanced2-3 weeks

Analyze governance mechanisms of major DAOs for potential attack vectors like flash loan governance attacks.

GovernanceDeFiGame TheoryResearch

Bridge Security Deep Dive

advanced3-4 weeks

Conduct a thorough analysis of cross-chain bridge architectures and their historical vulnerabilities.

BridgesCross-chainResearchSecurity

Automation and Monitoring

Build systems for ongoing security monitoring and automated checks.

Contract Monitoring Bot

advanced3-4 weeks

Build a bot that monitors deployed contracts for suspicious transactions or state changes indicating exploitation.

Node.jsEthers.jsMonitoringAlerts

Automated Audit Pipeline

intermediate2 weeks

Create a CI/CD pipeline that runs security tools (Slither, Mythril, custom checks) on every commit.

CI/CDDevOpsSecurity ToolsAutomation

Exploit Alert System

intermediate2-3 weeks

Build a system that scrapes security feeds and alerts on new exploits relevant to protocols you're monitoring.

Web ScrapingAlertsAPIsPython

Storage Slot Monitor

advanced2-3 weeks

Create a tool that monitors critical storage slots in contracts and alerts on unexpected changes.

EVM StorageMonitoringEthers.js

Mempool Watcher for Attacks

advanced3-4 weeks

Build a mempool monitoring tool that detects potential attack transactions before they're mined.

MempoolMEVReal-time AnalysisNode.js

Specialized Security Research

Deep dives into specific vulnerability classes and emerging threats.

L2 Sequencer Risk Analysis

advanced3-4 weeks

Research and document risks from centralized L2 sequencers including liveness failures and censorship attacks.

L2 architectureResearchRisk analysis

Account Abstraction Security Guide

advanced3-4 weeks

Analyze security considerations for ERC-4337 account abstraction including paymaster and bundler risks.

ERC-4337Account abstractionSecurity research

Cross-Chain Message Verification

advanced4-5 weeks

Research vulnerabilities in cross-chain messaging protocols and verification mechanisms.

Cross-chainMessaging protocolsSecurity research

EIP Implementation Analysis

advanced2-3 weeks per EIP

Analyze security implications of new EIPs before they're widely adopted.

EIP processSpecification analysisForward thinking

Compiler Bug Investigation

advanced3-4 weeks

Research historical Solidity compiler bugs and build detector for affected contracts.

Compiler internalsVersion analysisDeep Solidity

Tips from the field

  • 1.

    Start with Code4rena contests to build a public track record of findings before pitching to protocols directly.

  • 2.

    Document every finding in a personal database. Patterns you see once will appear again, and quick reference saves time.

  • 3.

    Build relationships with protocol teams even when you don't find bugs. Reputation matters more than individual audits.

  • 4.

    Specialize in one area deeply (bridges, lending, AMMs) before broadening. Deep expertise commands premium rates.

  • 5.

    Always disclose responsibly. Never publish exploit details before the protocol has patched. Your reputation depends on trust.

More for smart contract auditor