Back to Blog
DeFi SecuritySmart ContractSecurity ChecklistWeb3

DeFi Security Checklist 2026

March 8, 20269 min readRedVolt Team

In 2025, DeFi protocols lost $3.4 billion to exploits. The Bybit hack alone accounted for $1.5 billion. Early 2026 isn't looking better — $86 million stolen in January, another $24 million in February. The attacks are getting more sophisticated, but most of them succeed because of preventable mistakes.

After auditing dozens of DeFi protocols, we've compiled the security checklist we wish every team used before deployment. This isn't theoretical — every item on this list maps to a real attack that cost real money. For the step-by-step audit process itself, see How to Audit a Smart Contract Before Launch.

$3.4B

Crypto Stolen in 2025

$1.5B

Bybit Hack Alone

19%

Of Hacked Protocols Used Multisig

2.4%

Used Cold Storage

Smart Contract Security

The code is the foundation. If your contracts are vulnerable, nothing else matters.

AreaWhat to Check
Multiple AuditsGet at least two independent audits. Different auditors have different strengths and blind spots.
Static AnalysisRun Slither, Aderyn, and Mythril. Fix all findings or document why they're false positives.
Fuzz TestingUse Echidna, Medusa, or Foundry fuzzing (see our free tools guide). Define critical invariants and let the fuzzer try to break them.
100% Test CoverageUnit tests, integration tests, and negative path tests. If a function isn't tested, assume it's broken.
Formal VerificationFor critical math (token pricing, reward distribution, liquidation logic), use Certora or SMTChecker. See our Formal Verification practical guide.
OWASP SC Top 10 ReviewWalk through every item in the OWASP Smart Contract Top 10 2026 against your codebase.
Re-Audit After ChangesAny code change after an audit — even a "minor" one — needs re-review. We've seen critical bugs introduced in one-line fixes.

Access Control and Key Management

In 2025, access control vulnerabilities caused $953 million in losses — making it the #1 category in the OWASP Smart Contract Top 10. And yet, only 19% of hacked protocols used multisig wallets.

AreaWhat to Check
Multisig for Admin FunctionsEvery privileged function (pause, upgrade, parameter changes) must require multiple signers. Use Safe (formerly Gnosis Safe) with 3-of-5 or higher.
Timelocks on GovernanceGovernance actions should have a minimum 24–48 hour delay. This gives the community time to react to malicious proposals.
Hardware Security ModulesStore signing keys in HSMs, not software wallets. A compromised laptop should not be able to drain your treasury.
Cold Storage for TreasuryKeep 90%+ of protocol funds in cold storage. Only operational funds should be in hot wallets.
Role SeparationSeparate deployer, admin, pauser, and upgrader roles. No single address should have all privileges.
Key Rotation PlanDocument your process for rotating keys if a team member leaves or a key is compromised.

🛑The Multisig Gap

Only 19% of hacked protocols used multisig wallets. Only 2.4% used cold storage for funds. These are basic operational security measures that cost nothing to implement. If your protocol's admin key is a single EOA on someone's MetaMask, you are one phishing email away from losing everything.

Oracle and Price Feed Security

Oracle manipulation is the third most common DeFi attack vector, as we detailed in Common DeFi Vulnerabilities We See in Every Audit. If your protocol uses external price data, this section is critical.

AreaWhat to Check
Decentralized OraclesUse Chainlink, Pyth, or other decentralized oracle networks. Never use on-chain spot prices from a single DEX pool.
TWAP ImplementationIf using on-chain prices, implement Time-Weighted Average Prices (TWAP) over a meaningful window (15–30 minutes minimum).
Price Deviation ChecksReject price updates that deviate more than X% from the last known price. Set X based on your asset's expected volatility.
Circuit BreakersAuto-pause protocol functions when price feeds show extreme volatility or staleness.
Oracle RedundancyUse multiple independent price sources. If one oracle fails or is manipulated, the others provide a sanity check.
Stale Price ProtectionCheck the oracle's lastUpdated timestamp. Reject prices older than your acceptable staleness threshold.
1

Flash borrow $50M in ETH

Attacker borrows a massive amount from Aave or dYdX — no collateral needed

2

Dump into target protocol's price oracle pool

The massive sell tanks the spot price on the DEX pool the protocol reads

3

Trigger liquidations at manipulated price

Protocol liquidates positions based on the artificially depressed price

4

Buy liquidated assets at discount

Attacker scoops up assets at a fraction of their real value

5

Repay flash loan + profit

Return the borrowed ETH. The damage is done. Total attack time: one block.

Flash Loan Protection

Flash loans amplify every other vulnerability. A bug that would cost an attacker $10,000 of their own capital to exploit becomes free with a flash loan. For the full mechanics, see Anatomy of a Flash Loan Attack: Step-by-Step Breakdown.

AreaWhat to Check
Same-Block RestrictionsFor sensitive operations (governance votes, price-dependent actions), require that the caller's balance existed in a previous block.
Borrowing CapsLimit the maximum amount that can be borrowed or deposited in a single transaction.
Withdrawal DelaysFor large withdrawals, implement a delay or multi-step process.
Snapshot VotingIf using token-weighted governance, snapshot balances at a past block — not the current one. See DAO Governance Security.

Protocol Design Security

These are the architectural decisions that prevent entire categories of attacks.

AreaWhat to Check
Checks-Effects-InteractionsAlways update state before making external calls. This prevents reentrancy by design, not by modifier.
Minimal Proxy ExposureIf using upgradeable proxies, initialize implementations immediately after deployment. Uninitialized implementations are hijack targets.
PausabilityInclude an emergency pause function callable by a multisig. When (not if) something goes wrong, you need a kill switch.
Rate LimitingLimit the rate of high-value operations (minting, withdrawing, parameter changes) to slow down exploits.
Composability Risk AssessmentDocument every external protocol your contract interacts with. Understand what happens if that protocol is paused, upgraded, or exploited. See The Hidden Risks of DeFi Composability.
Upgrade SafetyUse OpenZeppelin's upgrade safety checks. Verify storage layout compatibility. See Smart Contract Upgradability: Security Trade-offs.

Pre-Launch Operational Security

AreaWhat to Check
AI-Powered AuditStart with an AI-powered audit to catch the same vulnerability classes that top-500 auditors find — at a fraction of the cost. RedVolt's Web3 auditor uses 7 specialized AI agents to deliver comprehensive findings with automated PoC exploits, starting at $5,000. It's the fastest way to cover the OWASP Smart Contract Top 10 before engaging additional reviewers.
Bug Bounty ProgramLaunch on Immunefi before or at deployment. Set bounties proportional to TVL (10% of funds at risk for critical bugs).
Real-Time MonitoringDeploy Forta bots and OpenZeppelin Defender Sentinels to detect suspicious transactions immediately.
Incident Response PlanDocument who can pause, how to communicate with users, and your war room process. Practice it.
InsuranceConsider Nexus Mutual or InsurAce coverage. Costs 2–10% annually but provides a safety net for your users.
Verified Source CodeVerify all contracts on Etherscan/Sourcify immediately after deployment. Users and researchers should be able to review your code.
Deployment VerificationAfter deploying, verify that the deployed bytecode matches the audited source code exactly. Tools like Sourcify make this trivial.

Post-Launch Continuous Security

Security doesn't end at deployment. The attack surface changes as TVL grows, new integrations are added, and the threat landscape evolves.

01

Monitor

Real-time transaction monitoring with automated alerts for anomalies, large withdrawals, and governance actions.

02

Respond

Incident response within minutes. Auto-pause capabilities for critical thresholds. War room process for triage and mitigation.

03

Re-Audit

Every protocol upgrade, parameter change, or new integration triggers a security review. No exceptions.

04

Evolve

Update your threat model quarterly. New attack vectors emerge constantly — your security posture must keep pace.

The 2025–2026 Attack Landscape

Understanding recent attacks helps you prioritize your defenses:

AreaWhat to Check
Bybit ($1.5B, Feb 2025)Access control compromise. A single signing key was the single point of failure for $1.5 billion in assets.
Cetus ($223M, May 2025)Smart contract logic bug in the concentrated liquidity implementation.
Blend Protocol ($10.8M, Feb 2026)Business logic vulnerability in the lending protocol's collateral calculation.
CrossCurve ($2.9M, Feb 2026)Cross-protocol interaction exploit targeting the bridge between Curve pools.

⚠️The Pattern

The biggest losses come from the simplest failures: single-signer admin keys, missing input validation, untested edge cases. The most sophisticated exploit of 2025 (Bybit) succeeded because of inadequate key management — not a novel zero-day vulnerability. Fix the basics before worrying about exotic attack vectors.

Download the Checklist

Here's the condensed version. Print it. Pin it to your wall. Go through it before every deployment:

Pre-Audit:

  • Static analysis clean (Slither, Aderyn, Mythril)
  • 100% test coverage including negative paths
  • Fuzz testing with defined invariants
  • Documentation complete (architecture, requirements, risks)

Smart Contracts:

  • OWASP SC Top 10 review complete
  • Checks-effects-interactions pattern everywhere
  • No single-point-of-failure admin keys
  • Proxy/upgrade safety verified
  • At least 2 independent audits

Operations:

  • Multisig (3-of-5+) for all admin functions
  • Timelocks on governance (24h+ delay)
  • Emergency pause function tested
  • Incident response plan documented and practiced

Post-Launch:

  • Bug bounty live on Immunefi
  • Real-time monitoring active (Forta/Defender)
  • Source code verified on-chain
  • Re-audit process defined for all changes

For broader context on DeFi threat landscape, see The State of Web3 Security in 2026 and Cross-Chain Bridge Vulnerabilities: Lessons from $2B in Exploits. For cost planning, see our Smart Contract Audit Cost in 2026 pricing guide.


Need help checking items off this list? RedVolt's AI-powered auditor catches known vulnerability patterns in hours, and our expert review team handles the business logic and protocol design analysis. Start with an AI scan or request a full security engagement.

Want to secure your application or smart contract?

Request an Expert Review