Loading...
This is Part 2 of our two-part livestream series on smart contract security on LUKSO. In Part 1, we covered the fundamentals: common vulnerabilities, real-world examples, and key security principles every developer should know — especially when working with LUKSO Standard Proposals (LSPs).
In Part 2, we'll dive deeper into secure architecture, defensive coding patterns, and how to prepare your contracts for audit. Whether you're building a mini app or launching your own protocol, this workshop will help you write safer, more reliable smart contracts on LUKSO.
Learn defensive coding patterns and secure architecture for LUKSO
Work through practical examples and security exercises
Learn how to prepare your contracts for professional security audits
Part 2 builds on the fundamentals from Part 1 and focuses on advanced security concepts specific to the LUKSO ecosystem. We'll explore secure architecture patterns, defensive coding techniques, and comprehensive audit preparation strategies.
Laurence Kirk will cover advanced topics including permission management, authorization patterns, callback hooks, re-entrancy protection, and monitoring strategies. You'll also learn about the security review process and how to work effectively with auditors.
Explore our comprehensive courses for structured, multi-module learning experiences.
Browse Courses