Existing security practices, auditing tools, and formal verification methods designed for the EVM can be applied directly to ZKsync contracts.