Why fuzzing over formal verification?
Trail of Bits Blog » Blockchain
by Trail of Bits
1M ago
By Tarun Bansal, Gustavo Grieco, and Josselin Feist We recently introduced our new offering, invariant development as a service. A recurring question that we are asked is, “Why fuzzing instead of formal verification?” And the answer is, “It’s complicated.” We use fuzzing for most of our audits but have used formal verification methods in the past. In particular, we found symbolic execution useful in audits such as Sai, Computable, and Balancer. However, we realized through experience that fuzzing tools produce similar results but require significantly less skill and time. In this blog post, we ..read more
Visit website
Releasing the Attacknet: A new tool for finding bugs in blockchain nodes using chaos testing
Trail of Bits Blog » Blockchain
by Trail of Bits
1M ago
By Benjamin Samuels (@thebensams) Today, Trail of Bits is publishing Attacknet, a new tool that addresses the limitations of traditional runtime verification tools, built in collaboration with the Ethereum Foundation. Attacknet is intended to augment the EF’s current test methods by subjecting their execution and consensus clients to some of the most challenging network conditions imaginable. Blockchain nodes must be held to the highest level of security assurance possible. Historically, the primary tools used to achieve this goal have been exhaustive specification, tests, client diversity, m ..read more
Visit website
Secure your blockchain project from the start
Trail of Bits Blog » Blockchain
by Trail of Bits
1M ago
Systemic security issues in blockchain projects often appear early in development. Without an initial focus on security, projects may choose flawed architectures or make insecure design or development choices that result in hard-to-maintain or vulnerable solutions. Traditional security reviews can be used to identify some security issues, but by the time they are complete, it may be too late to fix some of the issues that could have been addressed at the design and development stages. To help clients identify and address potential security issues earlier in the project, Trail of Bits is rollin ..read more
Visit website
When try, try, try again leads to out-of-order execution bugs
Trail of Bits Blog » Blockchain
by Trail of Bits
1M ago
By Troy Sargent Have you ever wondered how a rollup and its base chain—the chain that the rollup commits state checkpoints to—communicate and interact? How can a user with funds only on the base chain interact with contracts on the rollup? In Arbitrum Nitro, one way to call a method on a contract deployed on the rollup from the base chain is by using retryable transactions (a.k.a. retryable tickets). While this feature enables these interactions, it does not come without its pitfalls. During our reviews of Arbitrum and contracts integrating with it, we identified footguns in the use of retryab ..read more
Visit website
Circomspect has been integrated into the Sindri CLI
Trail of Bits Blog » Blockchain
by Trail of Bits
2M ago
By Jim Miller Our tool Circomspect is now integrated into the Sindri command-line interface (CLI)! We designed Circomspect to help developers build Circom circuits more securely, particularly given the limited tooling support available for this novel programming framework. Integrating this tool into a development environment like that provided by Sindri is a significant step toward more widespread use of Circomspect and thus better support for developers writing Circom circuits. Developing zero-knowledge proof circuits is a difficult task. Even putting aside technical complexities, running non ..read more
Visit website
Celebrating our 2023 open-source contributions
Trail of Bits Blog » Blockchain
by Trail of Bits
3M ago
At Trail of Bits, we pride ourselves on making our best tools open source, such as Slither, PolyTracker, and RPC Investigator. But while this post is about open source, it’s not about our tools… In 2023, our employees submitted over 450 pull requests (PRs) that were merged into non-Trail of Bits repositories. This demonstrates our commitment to securing the software ecosystem as a whole and to improving software quality for everyone. A representative list of contributions appears at the end of this post, but here are some highlights: Sigstore-conformance, a vital component of our Sigstore ini ..read more
Visit website
Billion times emptiness
Trail of Bits Blog » Blockchain
by Trail of Bits
4M ago
By Max Ammann Behind Ethereum’s powerful blockchain technology lies a lesser-known challenge that blockchain developers face: the intricacies of writing robust Ethereum ABI (Application Binary Interface) parsers. Ethereum’s ABI is critical to the blockchain’s infrastructure, enabling seamless interactions between smart contracts and external applications. The complexity of data types and the need for precise encoding and decoding make ABI parsing challenging. Ambiguities in the specification or implementation may lead to bugs that put users at risk. In this blog post, we’ll delve into a newfou ..read more
Visit website
Can you pass the Rekt test?
Trail of Bits Blog » Blockchain
by Trail of Bits
9M ago
One of the biggest challenges for blockchain developers is objectively assessing their security posture and measuring how it progresses. To address this issue, a working group of Web3 security experts, led by Trail of Bits CEO Dan Guido, met earlier this year to create a simple test for profiling the security of blockchain teams. We call it the Rekt Test. The Rekt Test is modeled after The Joel Test. Developed 25 years ago by software developer Joel Spolsky, The Joel Test replaced a Byzantine process for determining the maturity and quality of a software team with 12 simple yes-or-no questions ..read more
Visit website
Fuzzing on-chain contracts with Echidna
Trail of Bits Blog » Blockchain
by Trail of Bits
9M ago
By Guillermo Larregay and Elvis Skozdopolj With the release of version 2.1.0 of Echidna, our fuzzing tool for Ethereum smart contracts, we’ve introduced new features for direct retrieval of on-chain data, such as contract code and storage slot values. This data can be used to fuzz deployed contracts in their on-chain state or to test how new code integrates with existing contracts. Echidna now has the capability to recreate real-world hacks by fuzzing contract interfaces and on-chain code. In this blog post, we’ll demonstrate how the 2022 Stax Finance hack was reproduced using only Echidna to ..read more
Visit website
Evaluating blockchain security maturity
Trail of Bits Blog » Blockchain
by Dan Guido
10M ago
By Josselin Feist, Blockchain Engineering Director Holistic security reviews should reveal far more than simple bugs. Often, these bugs indicate deeper issues that can be challenging to understand and address. Given the time-boxed nature of reviews, security engineers may not have the opportunity to identify all bugs caused by these problems—and they may continue to cause issues in the future, even after initial bugs are fixed. That’s why it’s important to think about security more holistically when developing a secure product. This perspective requires consideration of the software developmen ..read more
Visit website

Follow Trail of Bits Blog » Blockchain on FeedSpot

Continue with Google
Continue with Apple
OR