5 reasons to strive for better disclosure processes
Trail of Bits Blog
by Trail of Bits
1w ago
By Max Ammann This blog showcases five examples of real-world vulnerabilities that we’ve disclosed in the past year (but have not publicly disclosed before). We also share the frustrations we faced in disclosing them to illustrate the need for effective disclosure processes. Here are the five bugs: Undefined behavior in the borsh-rs Rust library Denial-of-service (DoS) vector in Rust libraries for parsing the Ethereum ABI Missing limit on authentication tag length in Expo DoS vector in the num-bigint Rust library Insertion of MMKV database encryption key into Android system log with react-nat ..read more
Visit website
Introducing Ruzzy, a coverage-guided Ruby fuzzer
Trail of Bits Blog
by Trail of Bits
3w ago
By Matt Schwager Trail of Bits is excited to introduce Ruzzy, a coverage-guided fuzzer for pure Ruby code and Ruby C extensions. Fuzzing helps find bugs in software that processes untrusted input. In pure Ruby, these bugs may result in unexpected exceptions that could lead to denial of service, and in Ruby C extensions, they may result in memory corruption. Notably, the Ruby community has been missing a tool it can use to fuzz code for such bugs. We decided to fill that gap by building Ruzzy. Ruzzy is heavily inspired by Google’s Atheris, a Python fuzzer. Like Atheris, Ruzzy uses libFuzzer for ..read more
Visit website
Why fuzzing over formal verification?
Trail of Bits Blog
by Trail of Bits
1M ago
By Tarun Bansal, Gustavo Grieco, and Josselin Feist We recently introduced our new offering, invariant development as a service. A recurring question that we are asked is, “Why fuzzing instead of formal verification?” And the answer is, “It’s complicated.” We use fuzzing for most of our audits but have used formal verification methods in the past. In particular, we found symbolic execution useful in audits such as Sai, Computable, and Balancer. However, we realized through experience that fuzzing tools produce similar results but require significantly less skill and time. In this blog post, we ..read more
Visit website
Streamline your static analysis triage with SARIF Explorer
Trail of Bits Blog
by Trail of Bits
1M ago
By Vasco Franco Today, we’re releasing SARIF Explorer, the VSCode extension that we developed to streamline how we triage static analysis results. We make heavy use of static analysis tools during our audits, but the process of triaging them was always a pain. We designed SARIF Explorer to provide an intuitive UI inside VSCode, with features that make this process less painful: Open multiple SARIF files: Triage all your results at once. Browse results: Browse results by clicking on them to open their associated location in VSCode. You can also browse a result’s dataflow steps, if present. Cla ..read more
Visit website
Read code like a pro with our weAudit VSCode extension
Trail of Bits Blog
by Trail of Bits
1M ago
By Filipe Casal Today, we’re releasing weAudit, the collaborative code-reviewing tool that we use during our security audits. With weAudit, we review code more efficiently by taking notes and tracking bugs in a codebase directly inside VSCode, reducing our reliance on external tools, ensuring we never lose track of bugs we find, and enabling us to share that information with teammates. We designed weAudit with features that are crucial to our auditing process: Bookmarks for findings and notes: Bookmark code regions to identify findings or add audit notes. Tracking of audited files: Mark entir ..read more
Visit website
Releasing the Attacknet: A new tool for finding bugs in blockchain nodes using chaos testing
Trail of Bits Blog
by Trail of Bits
1M ago
By Benjamin Samuels (@thebensams) Today, Trail of Bits is publishing Attacknet, a new tool that addresses the limitations of traditional runtime verification tools, built in collaboration with the Ethereum Foundation. Attacknet is intended to augment the EF’s current test methods by subjecting their execution and consensus clients to some of the most challenging network conditions imaginable. Blockchain nodes must be held to the highest level of security assurance possible. Historically, the primary tools used to achieve this goal have been exhaustive specification, tests, client diversity, m ..read more
Visit website
Secure your blockchain project from the start
Trail of Bits Blog
by Trail of Bits
1M ago
Systemic security issues in blockchain projects often appear early in development. Without an initial focus on security, projects may choose flawed architectures or make insecure design or development choices that result in hard-to-maintain or vulnerable solutions. Traditional security reviews can be used to identify some security issues, but by the time they are complete, it may be too late to fix some of the issues that could have been addressed at the design and development stages. To help clients identify and address potential security issues earlier in the project, Trail of Bits is rollin ..read more
Visit website
DARPA awards $1 million to Trail of Bits for AI Cyber Challenge
Trail of Bits Blog
by Trail of Bits
1M ago
By Michael D. Brown We’re excited to share that Trail of Bits has been selected as one of the seven exclusive teams to participate in the small business track for DARPA’s AI Cyber Challenge (AIxCC). Our team will receive a $1 million award to create a Cyber Reasoning System (CRS) and compete in the AIxCC Semifinal Competition later this summer. This recognition not only highlights our dedication to advancing cybersecurity but also marks a significant milestone in our journey in pioneering solutions that could shape the future of AI-driven security. Our involvement in the AIxCC represents a ste ..read more
Visit website
Out of the kernel, into the tokens
Trail of Bits Blog
by Trail of Bits
1M ago
By Max Ammann and Emilio López Our application security team leaves no stone unturned; our audits dive deeply into areas ranging from device firmware, operating system kernels, and cloud systems to widely used technology such as mobile and web applications. This post examines two issues we identified over the past few years that, though unrelated, both showcase our commitment to securing open-source software: a potential denial-of-service (DoS) threat hidden in JSON Web Tokens (JWTs), and an oversight within the Linux kernel that could enable circumvention of critical kernel security mechanism ..read more
Visit website
Cryptographic design review of Ockam
Trail of Bits Blog
by Trail of Bits
1M ago
By Marc Ilunga, Jim Miller, Fredrik Dahlgren, and Joop van de Pol In October 2023, Ockam hired Trail of Bits to review the design of its product, a set of protocols that aims to enable secure communication (i.e., end-to-end encrypted and mutually authenticated channels) across various heterogeneous networks. A secure system starts at the design phase, which lays the foundation for secure implementation and deployment, particularly in cryptography, where a secure design can prevent entire vulnerabilities. In this blog post, we give some insight into our cryptographic design review of Ockam’s pr ..read more
Visit website

Follow Trail of Bits Blog on FeedSpot

Continue with Google
Continue with Apple
OR