# Smart Contract Security Research A structured knowledge graph covering the EVM, Solidity, vulnerability patterns, real-world exploits, defensive security, and DeFi protocol mechanics. Each note captures a single atomic claim, linked into a navigable graph via wiki links and topical indexes. The graph structure makes security knowledge compounding rather than linear. Notes link to the EVM behaviors that enable vulnerabilities, the exploit incidents that demonstrated them, and the defensive patterns that prevent them — so discovering one insight surfaces all related context. Cross-cutting connections (a compiler bug note linking to both a reentrancy exploit and an upgrade safety pattern) surface relationships that flat taxonomies miss. The graph currently contains **300+ notes** spanning six major knowledge areas. --- ## Knowledge Areas ### [[evm-internals]] Opcodes, gas mechanics, storage layout, memory model, and execution semantics. The foundational layer — understanding EVM behavior is prerequisite to understanding why vulnerabilities exist. ### [[solidity-behaviors]] Solidity language features, compiler output, type system, ABI encoding, and comparison with Vyper. Covers the gap between what developers write and what the EVM executes. ### [[vulnerability-patterns]] The largest index — known attack vectors and their mechanics, from reentrancy and access control to compiler bugs, DeFi-specific exploits, ZK proof systems, and L2 security. ### [[exploit-analyses]] Real-world smart contract exploit incidents and root cause analyses. Covers supply chain attacks, DeFi exploits, bridge failures, governance attacks, and threat actor patterns. ### [[security-patterns]] Defensive best practices, safe coding patterns, and invariant design. Access control, reentrancy guards, oracle verification, upgrade safety, and audit methodology. ### [[protocol-mechanics]] DeFi protocol designs, token standards, and their security properties. AMMs, lending protocols, stablecoins, liquid staking, restaking, RWAs, perpetual DEXs, governance, cross-chain bridges, and L2 architecture. --- <!-- ## How to Navigate **By topic** — Start from the knowledge area indexes above. Each index organizes notes by subcategory with context explaining relevance. **By type** — Query YAML frontmatter across notes: `rg '^type: vulnerability' notes/` **By connection** — Follow wiki links between notes. Find what references a given note: `rg '\[\[note title\]\]' notes/` -->