Describe the various forms it may take and construct minimal sample contracts for each variant. Also describe variants that look similar but are not a weakness, and construct minimal contracts for these non-weaknesses.
Describe the consequences if the weakness is exploited.
Collect vulnerable contracts used by the papers to motivate/illustrate the weakness.
Summarize the code properties that tools are looking for so that they can detect the weakness.
Sketch ways to potentially exploit the different variants of the weakness.