R3SEC Resources

Browse our collection of resources to help you build more secure Solana smart contracts.

Audit Reports

Browse our public audit reports to understand common vulnerabilities and see our audit methodology in action.

Jupiter Exchange Swap Router

Medium Risk
April 2025

Security assessment of Jupiter's cross-chain swap router, focusing on smart contract vulnerabilities and transaction security.

View Full Report

Solana Lending Protocol

Critical Risk
March 2025

Comprehensive audit of a major DeFi lending protocol, examining collateralization mechanisms and liquidation processes.

View Full Report

NFT Marketplace Smart Contract

Low Risk
February 2025

Technical review of NFT marketplace contracts, including royalty enforcement and escrow systems.

View Full Report

Looking for Private Audit Reports?

Clients with active engagements can access their private audit reports through our secure portal.

Security Blog

Insights, analysis, and technical deep-dives from our security research team.

Common Pitfalls in Solana Program Development

April 15, 2025
DevelopmentBest Practices

Exploring the most frequent security issues we encounter during Solana program audits and how to avoid them.

Read More

Attack Vectors in Cross-Program Invocation

March 22, 2025
SecurityAdvanced

How attackers can exploit cross-program invocation vulnerabilities and the security measures needed to protect against them.

Read More

Understanding Transaction Simulation for Security Testing

February 8, 2025
TestingTools

Leveraging transaction simulation as a powerful tool for identifying vulnerabilities before deployment.

Read More

Documentation

Comprehensive guides and resources to help you implement security best practices in your Solana projects.

Secure Development Guide

Step-by-step guide to integrating security practices throughout the development lifecycle for Solana programs.

Audit Preparation Checklist

Comprehensive checklist to prepare your codebase for a successful security audit.

Technical Architecture Reviews

Framework for conducting system-wide architecture reviews to identify security concerns beyond the code level.

Post-Audit Implementation Guide

Best practices for implementing audit recommendations and maintaining security post-audit.

Common Vulnerabilities

Learn about the most common security issues we find in Solana smart contracts and how to avoid them in your code.

Account Data Confusion

Critical Risk

Occurs when a program fails to validate that the account it's operating on contains the expected type of data.

Example:

A program expects Account A but receives Account B, potentially leading to unauthorized access.

Improper PDA Validation

High Risk

Program-derived addresses (PDAs) are not properly validated, allowing attackers to provide malicious seeds.

Example:

Missing checks on PDA derivation can lead to unauthorized account creation or access.

Instruction Snooping

Medium Risk

Attackers can extract sensitive information by examining transaction instructions before they're processed.

Example:

Front-running attacks where malicious actors exploit knowledge of pending transactions.

Missing Ownership Checks

High Risk

Programs that fail to verify account ownership, allowing unauthorized modifications.

Example:

An attacker provides a look-alike account they control instead of the expected system account.

Want our complete vulnerability database?

Access our comprehensive vulnerability knowledge base with detailed examples, prevention strategies, and remediation techniques.

Stay Updated on Solana Security

Subscribe to our newsletter for the latest security advisories, research, and best practices.