This document provides a checklist for evaluating potential growth hacks. It asks the user to describe the growth hack and then asks a series of yes/no questions to determine if the hack provides unique value, can be tested and tracked with numbers, activates users and their friends, offers incentives for sharing, is easy to use and share, can be outsourced or automated, uses technology in a new way, disrupts an industry, and encourages the user to improve any hacks that received negative answers.