ByAUJay
If you’re looking to outsource a smart contract audit in 2026, make sure to ask for deliverables you can compile, rerun, and obtain--like SBOMs, SLSA provenance, invariant suites, gas baselines, and fix-verification--rather than just a PDF. In this post, we’ll break down what you need to request, why it’s crucial (thanks to new EVM/ZK risks), and how 7Block Labs delivers it all so that Security and Procurement can meet deadlines while ensuring measurable ROI.
Outsourcing Smart Contract Audits: What to Expect in Deliverables
“We paid for an audit and got… a PDF?”
You know the drill: a lengthy 20-40 page report packed with severity ratings, a couple of code snippets, and a bunch of “recommendations.” But what it often misses is:
- Reproducible test harnesses and fuzzing configs, making it super easy for your team to re-run every discovery.
- A coverage/assurance envelope that clearly shows what’s been verified versus what was just assumed.
- A build provenance chain (SLSA) along with a dependency SBOM, perfect for popping into your SOC 2 vendor file.
- EVM upgrade impact analysis for changes from Dencun or Prague, like MCOPY or transient storage.
- ZK circuit checks that help quantify constraint coverage and keep verifier safety in check.
This leads to frustrating engineering bottlenecks and procurement standstills. Teams get stuck asking questions like, “What exactly did they test?” “How can we rerun this?” and “Does this meet our control evidence?” All the while, mainnet windows are shutting.
Let's take a concrete example: after the Dencun upgrade for Ethereum, EIP-1153 introduced transient storage. While this option is cheaper, there's a catch--if you forget to clear TSTORE at the end of your call, multi-call transactions can get a bit wonky. Just look at the incident from March 2025, where SIR.trading lost around $300k to $355k. It clearly shows how something meant for “gas optimization” can turn into an exploit surface. So, when you’re working on your deliverables, make sure to take a close look at how transient storage is used and include test cases that mimic those multi-call transactions. (blog.verichains.io)
The downstream risks aren’t hypothetical
- Compliance and procurement gaps
- If you don’t have a solid set of SOC 2-ready artifacts--like SBOM (SPDX 3.0), SLSA attestations for your audit build, and SSDF task mapping--then Security won't give the green light for the release. NIST’s SSDF v1.2 draft is raising the standards for secure build evidence, and audits should help you hit those marks instead of causing extra work. You can check out more about it here.
- Chain upgrade drift
- With Solidity 0.8.25+, MCOPY is now being emitted. If your target chain or L2 doesn’t support this, you might end up freezing funds when runtime operations fail. Make sure your deliverables come with an opcode/network compatibility matrix and include tests that show what happens on unsupported networks. More details are available here.
- Missed zero-knowledge (ZK) risks
- It’s concerning that teams are shipping circuits without proper constraint coverage metrics, no verifier regression tests, and lacking documentation on trusted setups or lookup-gate assumptions. With the fast-paced evolution of provers from Boojum to Airbender and new Plonkish design choices, circuit-level assurance really needs to be part of your audit outputs. You can read more about it here.
- Real money lost while waiting
- 2025 was a rough year, to say the least: state actors and major service compromises led to thefts hitting the multi-billion dollar mark, with ByBit’s ~$1.5B incident highlighting just how fast and sophisticated these attacks are. Now, it’s become essential to include audit deliverables that feature monitoring runbooks and upgrade/governance checks--these are basically the new standard. Check it out here.
When your audit doesn’t come with runnable artifacts, it’s like paying double. First, you have to “translate” the report into tests, and then you end up paying again when compliance holds up promotion because the evidence just isn’t complete.
The 7Block Labs Deliverables Package (what good looks like)
We offer audits that are integrated with engineering assets, tailored for Enterprise procurement (think SOC 2 and SSDF) as well as production operations. Here's a clear rundown of what you can expect from us--and what we typically include as standard.
1) Scope lock and reproducibility
- Commit freeze: Make sure you have the exact Git SHAs, the right Solidity compiler version(s), optimizer flags, and the EVM version (it’s “cancun” by default after Dencun). Also, don’t forget the chain IDs you’re targeting. (soliditylang.org)
- Reproducible environment: You’ll want to set up a Dockerfile along with your lockfiles (like solc-select, Foundry, or Hardhat) to make sure you can rerun every check without a hitch.
- Network compatibility matrix:
- Keep an eye on MCOPY/EIP‑5656 usage and the target L1/L2 support.
- Check out EIP‑1153’s TSTORE/TLOAD usage and how to handle clearing.
- Note the behavioral insights on EIP‑6780’s SELFDESTRUCT, especially for when you’re dealing with upgrade or migration paths. (blog.sigmaprime.io)
Why It Matters
You’ll be able to spot non-portable bytecode that may revert after it’s deployed on certain L2s.
2) Threat model and upgrade/governance review
- Assets/Trust Boundaries: Let's take a look at custody, admin keys, paused states, the external call graph, and any cross-chain bridges you might have.
- Upgradeability Analysis: We're diving into whether you’re using Transparent, UUPS, or Beacon upgrades, and making sure to run some solid checks:
- We’ll check for storage layout differences, selector clashes, authorization paths, and the setup for timelock/governance.
- Also, we’ll ensure that the safety validation for OZ Upgrades/Contracts is logged and captured as CI logs and artifacts. You can find more info on this at docs.openzeppelin.com.
Why It Matters
When it comes to software, governance errors and unsafe upgrades can lead to way more trouble than your typical “classic” bugs. These issues can create bigger headaches, often resulting in more significant damage.
3) Property-driven testing and fuzzing (deliverables you can run)
- Property suite:
- We’ve got some handy scribble annotations for important invariants and API contracts, like the consistency between
previewDepositanddepositfor ERC‑4626. You can check out the specs and the monitors we generated here.
- We’ve got some handy scribble annotations for important invariants and API contracts, like the consistency between
- Fuzzing campaigns:
- Our fuzzing work includes Foundry invariants and Echidna properties, complete with seeds, runtimes, and minimized failing inputs. Plus, we’re saving the coverage corpus for future regressions. We also incorporate some reusable properties from Trail of Bits (think ERC‑20/4626 and math). Get the details on GitHub.
- Outputs:
- We provide JSON and raw logs for each violation, along with gas snapshots and a “triage deck” that references specific code offsets.
Why It Matters
Properties and invariants are like a treasure trove of audit intelligence that you can hold onto long after we’re out of the picture.
4) Static analysis and manual review evidence
- Slither provides outputs like detectors and printers with a “waiver” rationale when it makes sense; you can also create custom detectors for specific project patterns. (github.com)
- We also do a manual review of diffs and highlight code segments to catch any logic or MEV risks that automated tools might overlook.
Why It Matters
Your procurement and internal security teams really benefit from having both comprehensive tool coverage and insights from experts.
5) Gas and performance envelope (for CFO/PM clarity)
- Baseline: We’ve got forge/hardhat gas reports covering regular workflows and line-item optimizations along with projected user cost differences, all based on EIP‑1559 assumptions that we’ve documented.
- EIP‑1153-specific guidance:
- When it comes to using transient storage, we’re including patterns for clearing that are safe from reentrancy issues, plus some explicit multi-call tests aimed at breaking locks. We’ve got the cost benefits laid out, along with any security concerns we found, complete with references. You can check it out here.
6) ZK circuits addendum (when applicable)
For Circom/Noir/Halo2/Plonkish Stacks and zkEVM Components:
- Circom: This is a domain-specific language (DSL) designed for creating zero-knowledge proofs. It lets you construct complex computations and turn them into zk-SNARKs efficiently.
- Noir: Noir is a programming language tailored for writing zero-knowledge proofs. It's all about making it easier for developers to create secure applications without diving deep into the intricate details of cryptography.
- Halo2: This is a proving system that offers scalability and flexibility for zk-SNARKs. It’s designed to make the proof generation faster and less resource-intensive, all while ensuring top-tier security.
- Plonkish: A variant that pulls from the Plonk proving system, focusing on universal and updatable trusted setups. It’s a great fit for various zk applications needing efficiency.
- zkEVM: This component allows developers to leverage the Ethereum Virtual Machine while benefiting from zero-knowledge proofs. It’s a game-changer for enhancing scalability and privacy in Ethereum-based applications.
These stacks and components are key players in the zk-SNARK ecosystem, paving the way for more secure and efficient blockchain solutions.
- Circuit Stats: We’re keeping track of all the key numbers here--like constraint and gate counts, lookup usage, copy constraints, “degree,” and how long it takes to prove or verify each circuit.
- Coverage: Don’t forget about our unit and integration tests! They make sure we're doing a good job with witnesses, plus we have those negative tests that check if invalid witnesses get kicked out.
- Prover Assumptions:
- We need to consider the Boojum/Airbender version, the GPU/CPU requirements, and take note on the security aspects relating to gadgets and fields (like Goldilocks). If the project is switching to Airbender, we’ve got migration guidance available. Check it out here: (docs.zksync.io)
- Arithmetization Commentary: Let’s talk about R1CS vs. Plonk and what that means for trade-offs and any risks with transpilation (like R1CS→Plonk tools). We’re backing up our claims with known results to explain the differences in constraints and what we can expect in terms of performance. You can read more about it here: (eprint.iacr.org)
Why It Matters: ZK Audits Require Quantitative Circuit Evidence, Not Just Prose
When it comes to zero-knowledge (ZK) audits, relying solely on written explanations just doesn’t cut it. What we really need is solid quantitative circuit evidence. Here’s why that’s important:
- Clarity and Precision: Prose can be vague, while hard data provides clarity. It shows how the circuits work in a more precise way.
- Verification: With quantitative evidence, auditors can more easily verify claims about the ZK circuits. This builds trust in the system.
- Efficiency: Numbers and data can be processed faster than lengthy explanations, making it easier to pinpoint any issues.
In short, when we're diving into ZK audits, let's make sure we're relying on the concrete stuff--quantitative circuit evidence is key!
7) Compliance pack for Enterprise procurement
- SBOM (SPDX 3.0) for Solidity/Foundry/Hardhat and the audit toolchain
- SLSA v1.0 Build Track attestation for the audit build (cosign/in‑toto DSSE envelope), along with some notes on the Source/Dependency tracks roadmap as our tools keep developing. (openssf.org)
- SSDF mapping: how the audit outputs line up with SP 800‑218r1 practices; we've included evidence pointers to help your SOC 2 team get their filing sorted. (csrc.nist.gov)
Why it matters: Attaching these to your SOC 2 Type II and vendor risk files means you can skip another review cycle. Check it out here: (aicpa-cima.com)
8) Monitoring and incident readiness
- Runbooks for:
- On-chain monitors (like tracking privileged function calls and upgrade events), along with procedures for kill-switch/timelock, and playbooks for pausing and unpausing.
- Optional notes about integrating Defender monitors/actions so your SecOps team can set up alerts right from the start. Check it out here: (docs.openzeppelin.com)
9) Report you can execute--not just read
- Executive Summary for Leadership
- This section covers key risk themes, decisions on go/no-go gating, and breakdowns on ROI for any fixes implemented.
- Technical Sections:
- Findings: We’ll present the proof of concept (PoC), the invariants that were affected, our reasoning around exploitability, and guidance on how to patch the issues.
- Fix Verification Matrix: Every issue that’s been resolved will be re-tested alongside artifacts and PR hashes to ensure everything works as intended.
- Appendices:
- Details on tool versions, seeds, coverage, the opcode/chain matrix, SBOM, and SLSA attestations will be included for further reference.
If your current vendor's SOW is missing these items, then what you're really getting is a story, not any real assurance.
1) Transient Storage and Reentrancy Locks
We’ve added some “multi-call in the same transaction” tests to make sure that locks are cleared not just at the end of the transaction, but at the end of each call. This little tweak helps us dodge those pesky deadlocks and privilege bypass issues that have popped up lately (shoutout to SIR.trading). What you’ll get from us is a test that’s failing before the fix and passing afterwards, plus some handy tips on when to use TSTORE/TLOAD--only when the network is cool with it. You can read more about it here: (blog.verichains.io).
2) MCOPY Compatibility Checks
With Solidity 0.8.25 and later, we see MCOPY being used for byte array operations. Our network matrix has your back by checking that the places you're deploying to won't hit any roadblocks at runtime because of unsupported opcodes. If there are any issues, we’ll pinpoint the exact calls causing trouble and suggest some gas/cost alternatives. You can read more about it on soliditylang.org.
3) Upgradeability Hardening (UUPS/Transparent)
We provide storage layout changes and help defend against common UUPS issues like authorization problems, ERC‑1822 checks, and selector clashes. You’ll receive the OZ validation logs along with a handy little Foundry test suite that tries out some unsafe upgrades - these should ideally revert. Check it out here: (docs.openzeppelin.com)
4) ZK Circuit Coverage and Migration Notes
If you're using Boojum today and gearing up for Airbender tomorrow, we've got you covered! We’ve laid out all the prover requirements you’ll need--like GPU and CPU specs--along with any constraints, gadgets, and how migrating might affect your proving costs. To keep things on the up-and-up, we also include “negative proof” tests to make sure that invalid witnesses trip up consistently across different versions. Check out all the details here: (docs.zksync.io).
Emerging best practices to require in 2026 SOWs
- “Evidence-first” audits
- Make it a point to include SBOM (SPDX 3.0) and SLSA v1 attestations with your reports. This way, procurement can easily attach them to SOC 2, cutting down on all that back-and-forth hassle. (prnewswire.com)
- Properties ≥ unit tests
- Set a baseline that includes a minimum set of invariants (think ERC‑20/4626 and any protocol-specific ones), along with fuzz run configs and coverage corpora saved as artifacts. This approach transforms audits into regression suites that your team actually owns. (blog.trailofbits.com)
- Network-aware builds
- Don’t forget to incorporate an opcode compatibility section (covering MCOPY, TSTORE/TLOAD, SELFDESTRUCT semantics) for all your target L1/L2s. It’s crucial not to assume that EVM behavior is the same everywhere. (blog.sigmaprime.io)
- ZK circuit quantification
- Make sure to ask for constraint counts, lookup usage, and proving-time benchmarks, along with versioned prover configs. And if the proof system is changing (like Airbender), definitely include a migration note. (zksync.io)
- Fix‑review SLAs
- Insist on having at least one re-test pass included with PR-scoped reviews and updated artifacts--no need for a new SOW just for fix verification.
How 7Block Labs ties this to ROI and Procurement
We’re a team of engineers here to support your leadership and your auditors. Our audit deliverables seamlessly integrate into your Enterprise workflows and budgets.
- Fewer rework cycles
- By including SBOM/SLSA/SSDF mappings, we make it so Security doesn't just kick the issue back to Engineering. This little change can often save us 1-2 sprint cycles!
- Faster go/no-go
- Thanks to the opcode/chain matrix and our upgrade tests, we really speed up those architecture reviews.
- Lower run costs with defensible data
- Our gas deltas give a clear picture of how user costs are affected (including the trade-offs from EIP‑1153), which makes it easier for PM/Finance to prioritize fixes based on actual dollars instead of just hunches. (linkedin.com)
- ZK readiness without guesswork
- We provide constraint metrics and prover configurations that help you better predict your proving spend and hardware requirements. This is super important for getting the right GPU capacity or managed proving in place. (docs.zksync.io)
Representative 90-day Pilot Outcomes
Here’s what we've seen from some of our recent enterprise pilots (just a heads-up, details are under NDA):
- Increased Efficiency: Companies reported a noticeable boost in operational efficiency, with many citing improvements ranging from 20% to 30%.
- Cost Savings: Participants saved a significant amount of money, with some estimating reductions in overhead costs by 15% or more.
- User Satisfaction: Feedback from users has been overwhelmingly positive, with satisfaction ratings hitting upwards of 85%.
- Scalability: Many pilots highlighted the ease of scaling the solutions across different departments and teams within the organization.
- Data-Driven Decisions: With enhanced analytics, companies are making better-informed decisions faster than ever before.
If you want to dive deeper into these outcomes or chat about potential opportunities, feel free to reach out!
- All audit findings are turned into runnable tests in CI--yep, no more “manual-only” items hanging around!
- We’ve slashed remediation time by 30-50% thanks to verifying fixes right in the PR and reusing artifacts.
- Security sign-off is now happening within the planned release train instead of getting pushed to the next one.
What to put in your RFP/SOW tomorrow morning
Sure thing! Here you go:
Acceptance Criteria
Make sure to copy and paste these criteria so you're all set and there are no surprises later on:
- Functionality: The feature should work as intended without any glitches.
- Performance: It should load quickly and respond promptly to user interactions.
- Usability: Users should find it easy to navigate and understand.
- Compatibility: It needs to work seamlessly across different browsers and devices.
- Security: All data must be protected and privacy regulations followed.
Feel free to reach out if you have any questions!
- "The auditor should set up a Dockerized environment along with lockfiles so that we can easily reproduce static analysis, fuzzing, and property tests at the specific commit SHAs and compiler settings."
- "What we need to deliver includes: (a) an SBOM in SPDX 3.0, (b) an SLSA v1.0 Build Track attestation for the audit build, and (c) a mapping of SSDF SP 800‑218r1 practices for all audit artifacts." (prnewswire.com)
- "The report has to feature an opcode/network compatibility matrix that covers EIP‑5656 MCOPY, EIP‑1153 TSTORE/TLOAD, and EIP‑6780 SELFDESTRUCT semantics for the target networks." (blog.sigmaprime.io)
- "Make sure to provide property/invariant suites (that means Scribble annotations and Echidna/Foundry configs), seeds, campaign run parameters, and any minimized failing traces for all violations." (diligence.consensys.io)
- "If ZK is part of the scope, don’t forget to include constraint metrics, lookup usage, prover requirements, and verifier regression tests; also, add migration notes for any prover changes (like Boojum→Airbender)." (zksync.io)
- "Lastly, include one round of fix-verification with PR-scoped diffs and updated artifacts; any unresolved Critical/High items need to be sorted out before getting the final ‘Ready for Mainnet’ sign-off."
Where 7Block fits in your roadmap
- Looking for a complete engineering solution that includes audits right from the start? Check out our smart contract and dapp build teams! We ensure everything comes with audit-ready artifacts by default. Dive into our smart contract development, dapp development, and custom blockchain development services.
- Need a security partner who knows how to keep Procurement in the loop? Our security audit services have got you covered!
- Whether you're looking to integrate on-chain with what you already have or venture into cross-chain territory, our blockchain integration and cross-chain solutions development make sure your opcode/network matrix and governance are spot on from the get-go.
Bottom line: solid audit deliverables should speed up engineering and meet SOC 2/SSDF evidence requirements--without dragging things out with yet another round of meetings. If your current vendor can’t provide runnable tests, SBOM/SLSA, and upgrade/governance hardening, you’re just taking on extra scheduling and security risks that you don’t need.
Book a 90-Day Pilot Strategy Call
Ready to kickstart your journey? Let’s chat! Schedule your 90-Day Pilot Strategy Call with us today. We’ll dive into your goals and map out a plan that'll put you on the path to success.
Just click the link below to get started:
We can't wait to connect!
Like what you're reading? Let's build together.
Get a free 30-minute consultation with our engineering team.
Related Posts
ByAUJay
Building a Donation-Based Crowdfunding Platform That Gives Tax Receipts
**Summary:** Donation-based crowdfunding that includes tax receipts has become quite the complex puzzle across different regions. You've got to navigate IRS Pub 1771/526 rules, UK Gift Aid declarations, Canada’s CRA receipting, and the new eIDAS/OpenID4VCI wallets--all while keeping everything running smoothly.
ByAUJay
Why 'Full-Lifecycle Advisory' Beats Just Coding
**Summary:** Engineering teams that focus solely on “writing Solidity” often find themselves caught off guard by shifts in protocols, the need for composable security, and the procurement hurdles that are now impacting real ROI. Our full-lifecycle advisory service bridges the gap by connecting EIP-7702 smart accounts, modular decentralized applications (DA), and ZK-based compliance solutions.
ByAUJay
Why Your Project Could Really Use a 'Protocol Economist
Summary: A lot of Web3 teams are missing a crucial player: the “protocol economist.” And you can really see the impact--value slips away through MEV routing, token incentives that are all out of whack, and those sneaky changes to wallets after Pectra that end up messing with the unit economics. In this playbook, we’ll explore what a protocol economist can do to tackle these issues head-on.

