- Documentation concurrence.
- Variable naming concurrence.
- External function calls.
- Potential ETH vulnerabilies.
- Mathematical errors.
- Calls to external contracts.
- DOS vulnerabilities.
- Unbounded loops.
- Sudden vital variable changes without waiting periods.
- Modifier disorder.
- Unemitted logs.
- Erroneous logs.
- Ownership errors.
- Missing statements.
- Neglected checks.