- Manual and automated search for all the bugs in the code
- Determine the impact of any kind of data loss in the
application - Check of user roles and access rights
- Review configuration files and data stores
- Compliance regulations check (PCI standards, Auditing
objectives, HIPPA) - Detailed code review reports
- Searching for design flaws
- Check loops for miner attacks on timestamps and
transaction order - Determine countermeasures and mitigation