Awesome EVM Security 
EVM stands for "Ethereum Virtual Machine". The EVM powers the Ethereum mainnet, but also Layer 2 protocols, sidechains, and EVM-compatible chains.
This list is an overview of the EVM ecosystem from an information security management perspective.
Contents
Guides
- CryptoSec.info - Information to help beginners learn how to protect their funds against hackers and scammers.
- Simplified Roadmap for Blockchain Security - Covers all rudimentary topics that one needs to know in order to get into the field of Blockchain Security.
- How to become a smart contract auditor - Frequently asked questions that are related to auditing and auditors can get their first job.
Governance
- A beginner's guide to DAOs - Gives a high level overview of what DAOs are, why they are interesting and some of their use cases.
- Deep DAO - Lists, ranks and analyzes top DAOs across multiple metrics.
- SAFT Agreements - A commercial instrument used to convey rights in tokens prior to the development of the tokens' functionality.
- Voting Options in DAOs - Voting Options in DAOs.
- The Wyoming DAO bill - A thread about Wyoming DAOs .
- It Takes a Cryptonetwork - Prime's Strategy for DAO to DAO Relations.
- DAOs, Democracy and Governance - A paper by Ralph Merkle about DAOs.
Architecture
- Shelling Out: The Origins of Money - Illustrates the value of collectibles in reducing social transaction costs.
- Foundations of Cryptoeconomic Systems - This paper explores why the term "cryptoeconomics" is context dependent and proposes complementary micro, meso and macro definitions of the term.
- Towards a Practice of Token Engineering - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?
- A Crash Course in Mechanism Design for Cryptoeconomic Applications - Introduces the basic concepts of mechanism design, and gives a taste for their usefulness in the cryptocurrency world.
- WTF Is QF - A simple explanation of quadratic funding.
- Bonding Curves Explained - What bonding curves are and their potential applications.
Standards
- DeFi Safety - Best practices security score reviews.
- DASP Top 10 of 2018 - Decentralized Application Security Project Top 10 vulnerabilities.
- IVSCS - Immunefi Vulnerability Severity Classification System.
- Smart Contract Security Verification Standard - A free 14-part checklist created to standardize the security of smart contracts for developers, architects, security reviewers and vendors.
- Secureth guidelines - Aid you in formulating your own software engineering process by giving a complete picture of all the different concerns and expectations in your software projects.
- CryptoCurrency Security Standard (CCSS) - A set of requirements for all information systems that make use of cryptocurrencies, including exchanges, web applications, and cryptocurrency storage solutions.
- The Solcurity Standard - Opinionated security and code quality standard for Solidity smart contracts.
System Assets
- Security Considerations in the Solidity documentation - Lists some pitfalls and general security recommendations.
- Ethereum 2.0 Specifications Security Audit Report - Security Audit Report of the Eth2.0 spec by Least Authority.
