Security assessment and hardening workflow for EVM smart contracts. Use when Codex needs to audit Solidity or Vyper code, review protocol architecture for abuse paths, validate access control and value-accounting invariants, assess upgradeable/proxy deployments, evaluate oracle/bridge/DEX integration risk, or produce prioritized remediation guidance with reproducible proof-of-concept tests.
Perform a repository-grounded EVM security review and produce actionable findings with severity, exploitability, and concrete fixes.
Use references/vulnerability-checklist.md for category-level checks, references/past-exploit-checklist.md for high-frequency exploit priors, references/legacy-solidity-security-blog-map.md to selectively load the local Sigma Prime legacy corpus at /Users/tranthanh/Dev/Security/web3-audit/solidity-security-blog/README.md, references/public-audit-patterns.md for cross-protocol audit priors, references/competition-patterns.md for competition-derived exploit patterns, references/quillaudit-patterns.md for historical ERC20/crowdsale audit pitfalls, references/owasp-scs-alignment.md for OWASP SCSVS/SCSTG/SCWE alignment, and references/report-template.md when formatting output.
references/vulnerability-checklist.md and evaluate each category against concrete functions and code paths.references/past-exploit-checklist.md as a focused second pass.references/legacy-solidity-security-blog-map.md to map suspicious code patterns to relevant sections in /Users/tranthanh/Dev/Security/web3-audit/solidity-security-blog/README.md.>=0.8.x, explicitly separate mitigated-by-default issues from residual logic risk.references/public-audit-patterns.md to check recurring audit classes that often become incidents later.references/competition-patterns.md to check patterns repeatedly found in competitive audits.references/quillaudit-patterns.md to catch recurring token/crowdsale authorization and accounting mistakes.references/owasp-scs-alignment.md and map coverage against SCSVS domains.references/report-template.md for consistent sections and finding schema.Critical when exploitability can cause immediate catastrophic loss or irreversible protocol compromise.High when exploitability can cause material loss, lock user funds, or seize privileged control.Medium when impact is bounded but meaningful, or exploitability requires specific preconditions.Low when impact is limited, defense-in-depth is weak, or exploitability is narrow.Informational for non-exploitable design quality or maintainability issues.reentrancy or unchecked-calls) and explain whether the issue is legacy-only or currently exploitable.