Not a guide but my experience so far
After starting my first audit at Spearbit, I found myself lost for a moment; there was a lot of documentation on some subjects like how to write issues, which knowledge Junior Security Researchers (JSRs) need to have, etc.
However, some points needed to be clarified before finishing the first audit. Some weeks later, some other auditors asked me the same questions. So I decided to bring a little light to this. Let’s dive into this.
First of all, some of you might be asking who I am.
I go by the nickname of Deivitto. I’m a Software Engineer & Blockchain Security Researcher. Bug hunter and challenges enthusiast. Some other details can be found on my Github or Twitter.
Let’s jump into the article!
When I joined my first audit with Spearbit as Junior Security Researcher (JSR), my first thought was:
“Ok, let’s jump into the work!”,
The next one was:
“What is everything I’m supposed to do in my role? Where should I start lmao”.
While I could find a lot of information on how to write issues for Spearbit, which responsibilities, and which knowledge I must have, I couldn’t find the exact range of tasks I was supposed to perform.
Later, some other auditors asked me similar doubts.
Luckily, after a few questions, the Spearbit team and Lead Security Researchers (LSRs) provided me with the needed knowledge (better questions, better answers).
First, auditing for Spearbit wasn’t different from my previous audits at platforms like C4 or Sherlock.
It’s just another audit, so let’s be straightforward: read the code, look for issues, read the documentation, understand each invariant and check if they hold, and find concepts that are broken or have a minor issue. You are an auditor; you are supposed to act as such.
And well, you can also run some static analysis or other tools to look for common issues or improvements. Each approach is different, I prefer doing this to catch first typical stuff and get a basic understanding of what the code is supposed to do.
If you, like me, come from C4 / Sherlock contests and not from some audit firm, you know competitive audits very well. However, you’re now part of a team, not part of a competition.
Luckily, I had audited alongside a team before.
One thing I noticed auditing with Bronicle at C4, it’s how good it is to audit with other people that not only understand what you say but fulfill some missing expertise with their own.
If you find anything someone should take a look into or probably has a better understanding, (tag them: @user, cc: @user)
You may find more guidance in the Spearbook audit process.
After all, a close-up meeting will happen. Prepare to comment on your Critical, High, and Medium issues and some Low issues.
Finally, thanks for reading, and I would like to thank Spearbit Team for all the effort they put into giving a fantastic audit experience to clients and auditors.
Also, I’m grateful for all the knowledge and leadership provided so far until now by amazing LSRs such as @TheSecureum, @GerardPersoon, @cmichel, and @saw-mon-and-natalie.