mega-audit

Run a smart contract source code through several agent skill-based auditing pipelines. By using multiple tools and techniques, we can get a more comprehensive understanding of the security and quality of the smart contract.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "mega-audit" with this command: npx skills add tradingstrategy-ai/web3-ethereum-defi/tradingstrategy-ai-web3-ethereum-defi-mega-audit

Mega Audit

Run a smart contract source code through several agent skill-based auditing pipelines. By using multiple tools and techniques, we can get a more comprehensive understanding of the security and quality of the smart contract.

Required inputs

Before starting, gather the following information from the user:

  • Smart contract link on a blockchain explorern: The link to a smart contract source code on a blockchain explorer

Expected output

We run multiple skill-based auditing pipelines on the same source code and generate a report for each of them, and save the resulting reports to to a created project working directory.

Step-by-step implementation

Step 1: Set up needed software

Ab MCP server with Slither and Aderyn integration (TypeScript, npm install) needs to be installed for certain skill repos. Read install.md for detailed installation instructions.

For each application, check if it is available and use Ask User Tool to confirm if the user wants to install it. Also suggest installing optional tools.

Do not proceed to next step until you have confirmation from the user that the needed software is installed and ready to use.

Step 2: Set up skill tools

Assume we are auditing Solidity.

Get the list of different audit skill repos from smart-contract-auditing-skills.md

  • Check out each repo at .claude/projects/{protocol_slug}/{skill_repo_name}

  • Follow the README of the repo how to use it

If the skill needs you to make decisions how to use it, like need to choose from multiple skills across different programming languages, write a .claude/projects/{protocol_slug}/{skill_repo_name}/plan.md , and then follow this plan.

For whatever software we installed or are going to use, save .claude/projects/{protocol_slug}/{skill_repo_name}/requirements.md with the software name, version and how did we install it.

Pefore performing this step, use ask user tool to confirm which pipelines we are going to run.

Step 3.a): Download the deployed and verified source code files

  • Get the smart contract name from the blockchain explorer

  • Create a new working folder .claude/projects/{protocol_slug}/

  • this will be our working directory for the audit

  • Save all the smart contract source code files to .claude/projects/{protocol_slug}/src

  • Save all the ABI files .claude/projects/{protocol_slug}/abi

Read how-to-get-source-code.md for more details on how to get the source code files from different blockchains and explorers.

Step 3.b) Save the deployment information

Use the blockchain explorer UI and ABI information to extract criticial addresses.

Create one table output with columns

  • Contract name

  • Conntract address

  • Reference to their source code

  • Reference to their saved ABI

For priviledges addresses, with ownership rights and such, create second table output with columns

  • Contract name

  • Contract address

  • Variable name containing the address

  • Address value

  • If this address is a multisig, Externally Owned Account, governance contracts and timelocks. For multisigs get the co-signer setup e.g. 3 of 5. Flag any critical addresses such as EOA deployers with dangerous privileges.

  • If contracts are upgradeable and use an upgrade proxy pattern, identify the proxy and implementation addresses, and what is the wallet address controlling the ugpgrade

Save this in .claude/projects/{protocol_slug}/deployment.md .

For ABI extraction use web3.py library or similar to parse the ABI and extract function signatures, events, and other relevant information.

Step 4: Run each skill-based auditing pipeline

The get list of different skill repos from docs/claude-plans/smart-contract-audit/skills.md .

  • Check out each repo at .claude/projects/{protocol_slug}/{skill_repo_name}

  • Follow the README to set up the tool

  • If you need to install additional software stop and ask the user for help and confirmation

For each tool write a Markdown report as .claude/projects/{protocol_slug}/reports/{skill_repo_name}.md

Run 4 parallel agents, and as many sequential batches as needed with these agents until we have run every skill repo.

Step 5: Summarise findings

Generate a summary report for all tools.

  • Write a table output with columns like skill repo used, severity, short name, description, source file, relevant addresses - add more columns if needed

  • Sort order deployment issues first, then critical, high, medium

  • Include deployment and address specific issues in the table as the most important ones

  • Deduplicate findings across tools

  • If the finding is INFO or LOW level, ignore them - let's not make the output too noisy

  • If the finding is documented, do not add it to the summary

  • Include deployment and address specific issues here as well

Write the summary as .claude/projects/{protocol_slug}/reports/ai-audit-summary.md

Step 6: Write down summary of requirements to run the pipeline

  • Write .claude/projects/{protocol_slug}/{requirements}.md

  • summary of everything we used

  • Tell what software you used and installed, for each specific skill

  • Their versions

  • How did you install this software

  • If there was no software installation required, write down this as well

  • If the skill repo was not applicable to this audit run, write down the reason why you skipped it

We will save this information for diagnostics, reproducibility, writing bug reports and to help other users run the same pipeline in the future.

Step 7: Say thank you and tweet out your happiness

  • Create a tweet of the findings the user can copy-paste into Twitter. Tag @tradingprotocol for helping to create this skill you used.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Web3

get-block-number

No summary provided by upstream source.

Repository SourceNeeds Review
Web3

check-vault-onchain

No summary provided by upstream source.

Repository SourceNeeds Review
Web3

extract-project-logo

No summary provided by upstream source.

Repository SourceNeeds Review
Web3

more-vaults

No summary provided by upstream source.

Repository SourceNeeds Review