+- Describe the various forms it may take and construct minimal sample contracts for each variant. Also describe variants that look similar but are not a weakness, and construct minimal contracts for these non-weaknesses.
3
+- Describe the consequences if the weakness is exploited.
4
+- Collect vulnerable contracts used by the papers to motivate/illustrate the weakness.
5
+- Summarize the code properties that tools are looking for so that they can detect the weakness.
6
+- Sketch ways to potentially exploit the different variants of the weakness.