Time Allocated: 60 minutes
Points: 50
Group Size: 2-3 students
Materials Needed: Contracts handout, Vulnerability reference, Attack worksheet
Submission: Completed worksheet + 5-minute group presentation

Overview

Smart contract vulnerabilities have led to billions of dollars in losses. In this hands-on audit challenge, you'll step into the role of a security researcher, analyzing real-world vulnerability patterns and developing attack scenarios. Your mission: identify critical security flaws before malicious actors do.

Learning Objectives

  • Identify common smart contract vulnerabilities (reentrancy, access control, integer overflow)
  • Understand attack vectors and exploitation mechanics
  • Apply game-theoretic reasoning to adversarial scenarios
  • Evaluate economic incentives for attacking vs. reporting vulnerabilities
  • Propose practical security fixes and mitigation strategies

Activity Structure

1 Contract Review (20 minutes)

Each group receives 3 vulnerable contract snippets. For each contract:

2 Attack Development (15 minutes)

For each identified vulnerability:

3 Analysis & Comparison (10 minutes)

Discuss within your group:

4 Presentation (15 minutes total - 5 min/group)

Present your findings to the class:

Bonus Challenge: After completing the 3 main contracts, attempt the 3 advanced contracts for extra credit (up to +10 points). These involve more sophisticated attack vectors like flash loan exploits and oracle manipulation.

Deliverables

Item Points Description
Completed Worksheet 30 All 3 contracts analyzed with vulnerability identification, attack scenarios, and fixes
Group Presentation 15 Clear explanation, technical accuracy, time management
Class Participation 5 Asking questions, engaging with peer presentations
Total 50
Bonus Contracts +10 Optional advanced challenges

Tips for Success

Real-World Context: The DAO hack (2016) exploited reentrancy for $60M. Poly Network (2021) had access control issues leading to $600M loss. Your skills in this exercise translate directly to protecting billions of dollars in real assets.

Submission Instructions

  1. Complete the attack worksheet as a group (one copy per group)
  2. Include all group member names at the top
  3. Submit worksheet immediately after your presentation
  4. Be prepared to answer follow-up questions from the instructor

Related Resources

Rubric Answer Key Instructor Guide

Assignment Resources

© Joerg Osterrieder 2025-2026. All rights reserved.