Skip to main content

Smart Contract Standards

What makes a smart contract trustworthy — the language it's written in, or the years it has survived?

A hyperlink says "go here." A smart contract says "if this condition is met, value flows here, verified on-chain." The contract is only as good as the standard behind it. Three platforms, three philosophies of what "standard" means.

Three Philosophies

PlatformStandardizes TheApproachTrust Source
EVMInterfaceDefine the shape (ERC-20), let anyone implementCommunity battle-testing
SVMProgramOne shared implementation (SPL Token), everyone calls itFoundation maintenance
Move (Sui)LanguageCompiler-enforced ownership, capabilities, linear typesStructural impossibility

Each philosophy produces a different trust profile. EVM trust comes from survival — thousands of deployments, billions at stake, years of exploits hardening the patterns. SVM trust comes from centralization — one canonical program, foundation-audited. Move trust comes from prevention — the compiler rejects entire vulnerability classes before deployment.

The full comparison: Smart Contracts.

Standard Fittings

In P&ID: you do not build your own pressure relief valve. You specify an ANSI-rated assembly by code. Smart contract standard fittings work the same way — audited, composable building blocks you compose rather than create.

Lindy Effect

The Lindy Effect: the longer a non-perishable thing survives, the longer its remaining life expectancy. Every year a standard fitting goes without exploit extends its expected trustworthiness. Time is the audit that never ends.

LibraryPlatformLindy AgeWhat It Provides
OpenZeppelinEVM2016 — 10 yearsToken standards, access control, proxy upgrades, governance
SoladyEVM2022 — 4 yearsGas-optimized alternatives to OpenZeppelin
SolmateEVM2021 — 5 yearsMinimalist, gas-efficient primitives
SPL TokenSVM2020 — 6 yearsCanonical fungible/non-fungible token program
AnchorSVM2021 — 5 yearsFramework-level account validation, IDL generation
OpenZeppelin SuiMove2025 — newAccess choreography (two-step, time-locked), safe math

OpenZeppelin arriving on Sui is the maturity signal. Language-level safety handles objects and ownership. It does not handle access choreography or overflow-safe arithmetic. Even Move needs standard fittings.

Fitting Catalog

FittingLibraryP&ID EquivalentWhat It Does
ERC20OpenZeppelin EVMFlow meterFungible token interface — balance tracking, approvals, transfers
OwnableOpenZeppelin EVMManual interlockSingle-owner access control
ReentrancyGuardOpenZeppelin EVMSafety relief valvePrevents recursive call exploitation
two_step_transferOpenZeppelin SuiTwo-key interlockOwnership handoff requires initiate + accept
delayed_transferOpenZeppelin SuiTime-delay relayTime-locked wrapper with enforced minimum delay
mul_divOpenZeppelin SuiFlow computer(a * b) / c without intermediate overflow
u512OpenZeppelin SuiExtended-range gauge512-bit math prevents precision loss in tokenomics

In A&ID nomenclature: standard fittings are instruments. Code: SF — Standard Fitting. Reading: DA-SF01 = Digital Agent using Standard Fitting #1.

Development Paths

PathMental ModelStandard FittingsTime to Productive
EVM DevelopmentGlobal state + msg.senderDeepest — OpenZeppelin, Solady, SolmateWeeks
Solana DevelopmentAccounts + PDAs + CPIsGrowing — SPL Token, Anchor, MetaplexMonths
Sui DevelopmentObjects + ownership + capabilitiesEmerging — OpenZeppelin Sui, native patternsWeeks

Safety Comparison

Which vulnerabilities does each platform prevent by design versus by convention?

VulnerabilityEVMSVMMove
Re-entrancyStandard fitting (guard)Runtime (CPI depth)Impossible (no recursion)
Asset duplicationStandard fitting (accounting)Runtime (slot checks)Impossible (linear types)
Integer overflowLanguage (Solidity 0.8+)Partial (debug only)Always (bytecode verifier)
Access controlStandard fitting (modifiers)Convention (signer checks)Structural (capabilities)

Where the platform prevents it structurally, no standard fitting is needed. Where it doesn't, the fitting IS the standard. This is why OpenZeppelin is Lindy on EVM — it fills gaps the language leaves open.

Auditing

ToolPlatformWhat It Does
SlitherEVMStatic analysis — detects common vulnerabilities
EchidnaEVMProperty-based fuzzing
CertoraEVMFormal verification (commercial)
Move ProverMoveFormal verification (built-in, free)
MetamorphicEVMMetamorphic contract detection
SCSFGEVMSecurity field guide

Contract Tooling

Indexed repositories for finding existing contracts:

DeFi Primitives

Production protocols as reference implementations:

CategoryProtocols
AMMsUniswap v3, Curve, Balancer v2, 1inch
LendingAave v3, Compound, dYdX
DerivativesOpyn, Vega, PsyOptions
InsuranceNexus Mutual
YieldYearn, Enzyme
PredictionPolymarket, Augur
Solana DeFiDrift v2, GooseFX, TWAMM

Starter Kits

Context

  • Smart Contracts — Full platform comparison: safety, speed, composability, ecosystem
  • A&ID Template — Standard fittings as instruments in the agent nomenclature
  • Hacker Laws — Lindy Effect: survival compounds trust
  • Standards — Why standards compound quality without requiring heroes
  • Protocols — Algorithms decide; protocols handshake; contracts execute
  • DeFi Tokens — Token economics behind the primitives
  • Knowledge Stack — Primitives, protocols, standards, platform
  • Developer Experience — DX as northstar for adoption

Questions

Does the chain with the oldest audited library always win on trust — even if a younger chain is structurally safer?

  • If standard fittings get safer with age (Lindy), what happens when a vulnerability is found in a 10-year-old pattern — does the trust reset or does the fix compound it?
  • OpenZeppelin fills gaps the language leaves open. If Move closes those gaps structurally, does OpenZeppelin on Sui become redundant — or does it solve a different class of problem?
  • Which DeFi primitive is most overdue for a standard fitting that doesn't exist yet?
  • At what point does a standard fitting become too trusted — where its presence replaces thinking about the actual security model?