50 Portfolio Project Ideas for Smart Contract Auditors
As a smart contract auditor, your portfolio needs to demonstrate deep security expertise and practical experience finding vulnerabilities. These project ideas will help you build credibility with protocols and audit firms.
Vulnerability Research Projects
Document and analyze real-world exploits to demonstrate your understanding of attack vectors.
Exploit Post-Mortem Database
Create a searchable database of DeFi exploits with technical breakdowns, root cause analysis, and prevention strategies for each incident.
Reentrancy Pattern Catalog
Build a comprehensive catalog of reentrancy variations including cross-function, cross-contract, and read-only reentrancy with code examples.
Flash Loan Attack Simulator
Develop a tool that simulates flash loan attacks against test contracts to demonstrate various manipulation techniques.
Oracle Manipulation Lab
Create a testing environment demonstrating price oracle attacks including TWAP manipulation and spot price attacks.
Access Control Vulnerability Scanner
Build a static analysis tool that detects common access control issues like missing modifiers and privilege escalation paths.
Security Tooling Projects
Build tools that automate or assist the audit process.
Custom Slither Detectors
Write custom Slither detectors for vulnerability patterns not covered by default rules, such as protocol-specific issues.
Foundry Fuzzing Framework
Create a reusable fuzzing framework with invariant tests for common DeFi primitives like AMMs, lending, and vaults.
Gas Griefing Detector
Build a tool that identifies potential gas griefing vulnerabilities in contracts with unbounded loops or external calls.
Upgrade Safety Checker
Develop a tool that validates proxy upgrade safety by checking storage layout compatibility and initialization patterns.
MEV Vulnerability Scanner
Create a scanner that identifies sandwich attack and frontrunning vulnerabilities in DeFi contracts.
CTF and Educational Content
Create learning resources that demonstrate your teaching ability and deep understanding.
Custom CTF Challenge Set
Design a series of increasingly difficult smart contract CTF challenges covering various vulnerability classes.
Damn Vulnerable DeFi Solutions Guide
Write detailed walkthroughs for Damn Vulnerable DeFi challenges explaining the thought process and multiple solution approaches.
Security Pattern Cheatsheet
Create a visual cheatsheet of security patterns and anti-patterns with code examples and real exploit references.
Audit Report Template Library
Develop a library of audit report templates with standardized vulnerability descriptions and severity classifications.
Video Audit Walkthrough Series
Record video walkthroughs of your audit process on open-source contracts, explaining your methodology.
Real Protocol Analysis
Analyze live protocols to demonstrate real-world auditing skills.
Public Audit of Small Protocol
Conduct a thorough public audit of a smaller protocol's contracts and publish your findings responsibly.
Protocol Comparison Analysis
Compare the security architecture of similar protocols (e.g., Aave vs Compound) highlighting design tradeoffs.
Bug Bounty Hunting Documentation
Document your bug bounty hunting process and findings (with permission) to show real vulnerability discovery.
Governance Attack Analysis
Analyze governance mechanisms of major DAOs for potential attack vectors like flash loan governance attacks.
Bridge Security Deep Dive
Conduct a thorough analysis of cross-chain bridge architectures and their historical vulnerabilities.
Automation and Monitoring
Build systems for ongoing security monitoring and automated checks.
Contract Monitoring Bot
Build a bot that monitors deployed contracts for suspicious transactions or state changes indicating exploitation.
Automated Audit Pipeline
Create a CI/CD pipeline that runs security tools (Slither, Mythril, custom checks) on every commit.
Exploit Alert System
Build a system that scrapes security feeds and alerts on new exploits relevant to protocols you're monitoring.
Storage Slot Monitor
Create a tool that monitors critical storage slots in contracts and alerts on unexpected changes.
Mempool Watcher for Attacks
Build a mempool monitoring tool that detects potential attack transactions before they're mined.
Specialized Security Research
Deep dives into specific vulnerability classes and emerging threats.
L2 Sequencer Risk Analysis
Research and document risks from centralized L2 sequencers including liveness failures and censorship attacks.
Account Abstraction Security Guide
Analyze security considerations for ERC-4337 account abstraction including paymaster and bundler risks.
Cross-Chain Message Verification
Research vulnerabilities in cross-chain messaging protocols and verification mechanisms.
EIP Implementation Analysis
Analyze security implications of new EIPs before they're widely adopted.
Compiler Bug Investigation
Research historical Solidity compiler bugs and build detector for affected contracts.
Tips from the field
- 1.
Start with Code4rena contests to build a public track record of findings before pitching to protocols directly.
- 2.
Document every finding in a personal database. Patterns you see once will appear again, and quick reference saves time.
- 3.
Build relationships with protocol teams even when you don't find bugs. Reputation matters more than individual audits.
- 4.
Specialize in one area deeply (bridges, lending, AMMs) before broadening. Deep expertise commands premium rates.
- 5.
Always disclose responsibly. Never publish exploit details before the protocol has patched. Your reputation depends on trust.