How do real smart contract audits work in practice? What do auditors actually check first?
I’m trying to understand how smart contract audits work in real life — not the generic “run a few tools and look for reentrancy” advice we see online, but the actual workflow auditors follow when reviewing production contracts.
When an audit begins, what do professionals actually check first?
Is it access control paths, state-transition logic, invariants, storage layouts, upgradeability patterns, or something else entirely?
I’m also confused about how auditors balance automated tools (Slither, Mythril, Foundry fuzzing, Echidna invariants) with manual review. Do these tools come first, or do they support insights you get only after reading the code?
For those who’ve done audits professionally:
• How do you structure your review from threat modelling → manual analysis → testing → severity classification?
• What are the mistakes beginners make when they “audit” but miss deeper logic flaws?
• And what mindset helps you avoid sounding generic in security interviews?
Would love a walkthrough of the real auditing process.