FUZZING
54 articles tagged "fuzzing"
Why Invariant Testing Matters for DeFi Security
Unit tests check what you think of. Invariant tests check what you don't. Here's why every DeFi protocol needs invariant testing and how it has saved millions in real engagements.
How We Found Real Vulnerabilities with Fuzzing
A technical deep-dive into real vulnerabilities we've found through fuzzing, from critical accounting bugs to subtle rounding exploits. Includes the properties that caught them.
Property Design Patterns for DeFi Lending Protocols
A practical catalog of invariant property patterns for lending protocols — from solvency and utilization bounds to liquidation health checks — with Solidity code for each.
Echidna vs Medusa: A Practical Comparison for Security Researchers
A hands-on comparison of Echidna and Medusa for smart contract fuzzing. We cover performance, configuration, corpus management, and when to choose each tool.
5 Smart Contract Vulnerabilities That Unit Tests Will Never Catch
Unit tests check what you expect. But the most dangerous vulnerabilities hide in the unexpected — cross-function reentrancy, rounding accumulation, and more. Here are five categories unit tests will never catch.
How to Set Up Continuous Security Testing with CI/CD and Fuzzing
Stop treating security as a one-time audit. Learn how to integrate Chimera-based fuzzing into your CI/CD pipeline with GitHub Actions so every pull request gets fuzzed automatically.
Stateful Fuzzing Explained: Why Sequence Matters in Smart Contract Testing
Most smart contract bugs only manifest after a specific sequence of transactions. Stateful fuzzing explores these sequences automatically — here is how it works and why it matters.
From Zero to Fuzzing: A Beginner's Guide to the Chimera Framework
A hands-on beginner tutorial for the Chimera framework. Go from an empty project to running invariant tests with Foundry, Echidna, and Medusa — no prior fuzzing experience required.
How to write your first invariant test
A hands-on tutorial that walks you through writing three invariant properties for a simple ERC-20 vault, then running them with Foundry and Echidna. Working test suite in 30 minutes.
Smart contract fuzzing tools compared: Echidna, Medusa, Halmos, and Foundry
Four tools dominate smart contract fuzzing. Each approaches the problem differently, and picking the wrong one wastes time. Here's how to match the right fuzzer to your project — or use all four together.
What is smart contract fuzzing?
Smart contract fuzzing throws millions of random inputs at your contracts to find states that violate your security assumptions. Here's how it works, what it catches, and how to get started.
7 common smart contract fuzzing mistakes (and how to fix them)
Your fuzzer ran for 24 hours and found nothing. That doesn't mean your code is safe — it might mean your campaign was broken. Here are the seven mistakes we see most often and how to fix each one.
How to fuzz ERC-4626 vaults: a step-by-step guide
ERC-4626 defines a clean vault interface and a set of guarantees that are surprisingly easy to break. This guide walks through identifying invariants, writing properties, and running fuzzing campaigns.
Foundry fuzz testing: from basic fuzzing to invariant tests
Foundry's built-in fuzzer goes well beyond what most developers use. This guide covers the full spectrum from basic input fuzzing to stateful invariant tests to bridging into dedicated fuzzing tools.
How to fuzz ERC-6909 multi-token contracts
ERC-6909 is the minimal multi-token standard powering Uniswap v4. This guide walks through identifying invariants, writing properties for per-ID accounting and dual approvals, and running fuzzing campaigns.
How to fuzz ERC-7540 async vaults
ERC-7540 adds async deposit and redemption flows on top of ERC-4626. This guide covers the lifecycle invariants, handler patterns for operator fulfillment, and campaigns that stress the request-claim state machine.
How to fuzz ERC-4337 account abstraction wallets
ERC-4337 wallets validate their own transactions and manage gas accounting. This guide covers the invariants that matter for account abstraction, from signature validation to paymaster solvency.
How to fuzz ERC 2535 diamond proxies: storage, selectors, and upgrades
Diamond proxies delegate calls to multiple facets, and the bugs live in upgrade sequences and storage collisions. This guide covers selector, storage, and loupe invariants with full Chimera properties.
How to fuzz ERC-1155 multi-token contracts
ERC-1155 combines batch operations with mandatory receiver callbacks, creating a reentrancy surface that single-token testing misses. This guide covers the invariants and handler patterns that catch the real bugs.
Flash loan exploits: how they work and how invariant testing catches them
Flash loans let anyone borrow millions for a single transaction. When combined with reentrancy or oracle manipulation, they drain protocols in one block. Here's how invariant testing catches what unit tests can't.
Access control bugs in Solidity: real hacks and property-based defense
A missing modifier. A delegatecall to an untrusted address. Access control bugs have caused some of the largest losses in DeFi history. Here's how to find them with property-based testing.
Halmos symbolic execution for smart contracts: setup, limitations, and when it beats fuzzing
Fuzzers sample randomly. Symbolic execution explores every path. Halmos brings symbolic execution to Foundry — but it's not always the right tool. Here's when it wins and when fuzzing is better.
ZK circuit security: constraint bugs, witness leaks, and audit patterns
ZK circuits aren't programs — they're constraint systems. The bugs look different: under-constrained signals, witness malleability, missing range checks. Here's how to audit them.
Medusa fuzzer tutorial: from install to first bug
A hands-on tutorial that takes you from installing Medusa to catching your first real bug. Covers project setup, property writing, campaign configuration, and result analysis.
Echidna tutorial: advanced stateful fuzzing campaigns
Go beyond basic Echidna usage with advanced config tuning, corpus management, multi-contract setups, and stateful campaign strategies that catch deep bugs.
Mutation testing for smart contracts: measure your test suite quality
Your tests pass. But are they actually good? Mutation testing injects faults into your code and checks if your tests catch them. Here's how to measure and improve.
Slither beyond defaults: writing custom detectors for your protocol
Default Slither detectors catch generic bugs. Custom detectors catch your protocol's bugs. Here's how to write them using the Slither API and SlithIR.
Chimera advanced patterns: multi-contract fuzzing with actors and ghosts
Take your Chimera skills to the next level. Multi-contract setups, actor patterns for simulating real users, ghost variables for state tracking, and cross-contract invariants.
Foundry invariant testing beyond the basics: handlers, actors, and bounded runs
Foundry's invariant testing is powerful but the docs barely scratch the surface. Here's how to use handlers, actors, bounded inputs, and ghost variables like a pro.
Formal verification vs fuzzing: the definitive guide
Formal verification proves properties exhaustively. Fuzzing finds bugs probabilistically. Here's when each approach wins, what they miss, and how to combine them.
The complete smart contract security pipeline: first commit to mainnet
Every step from first commit to mainnet, in order. Static analysis, unit tests, invariant testing, formal verification, audits, deployment checks, and post-launch monitoring.
Advanced invariant testing techniques for DeFi protocols
Beyond basic property writing. Ghost variables, temporal properties, conditional invariants, bounding inputs, handling oracles, and debugging failing invariants.
Fuzzing + formal verification + invariant testing: combining them all
Write properties once, run them everywhere. Here's how to combine fuzzing, formal verification, and invariant testing in a single workflow using Chimera.
AI-guided fuzzing: from LLM property generation to automated campaigns
LLMs can suggest properties. Some are great, some hallucinate. Here's our practical workflow for using AI to speed up fuzzing without trusting it blindly.
Coverage-guided fuzzing deep dive: corpus management, seeds, and convergence
What happens inside a fuzzer? How coverage tracking, corpus management, and seed selection work together. Practical tips for getting better coverage faster.
Solana smart contract fuzzing: Trident, Honggfuzz, and property testing
Solana fuzzing is years behind EVM but catching up fast. Here's how to use Trident, honggfuzz, and proptest to find bugs in your Solana programs.
Fuzzing Rust smart contracts: CosmWasm, Solana, and cargo-fuzz
Rust smart contracts run on Solana, CosmWasm, and more. Here's how to fuzz them all with cargo-fuzz, proptest, and ecosystem-specific tools.
Cross-chain bridge security: invariants that would have caught the big hacks
Ronin, Wormhole, Nomad — billions lost to bridge hacks. For each one, here's the specific invariant that would have caught the bug before deployment.
AMM and DEX invariant testing: properties every swap protocol needs
Every AMM needs these properties: constant product conservation, fee accounting, LP share math, and sandwich resistance. Here's the complete invariant suite.
Staking and rewards distribution: fuzzing the accounting protocols get wrong
Staking reward math is deceptively tricky. Division-before-multiplication, rounding dust, flash-stake exploits — here are the properties that catch them all.
Governance and timelock security: properties for proposal lifecycle
Governance bugs have led to catastrophic exploits. Here are the properties that protect proposal lifecycles, voting power, timelocks, and execution flow.
Oracle integration testing: fuzzing price feeds and manipulation resistance
Your protocol trusts an oracle. But does it handle stale prices, sudden deviations, and manipulation attempts correctly? Here's how to fuzz your oracle integration.
Fuzzing upgradeable contracts: storage layout, proxy safety, and upgrade invariants
Upgradeable contracts have unique attack surfaces: storage collisions, re-initialization, and unauthorized upgrades. Here are the invariants that protect them.
Reentrancy in 2025: read-only, cross-function, and cross-contract patterns
Classic reentrancy is solved. But read-only reentrancy, cross-function reentrancy, and callback-based patterns are still catching protocols off guard.
Price manipulation attacks: spot prices, TWAPs, and how to fuzz your defenses
Flash loan price manipulation, TWAP gaming, oracle sandwiches — here's how each attack works and the properties that prove your defenses hold.
Signature replay and permit attacks: testing EIP-712 and ERC-2612 with fuzzing
Signatures are everywhere in smart contracts. Replay attacks, permit griefing, and malleability bugs are still catching protocols. Here's how to fuzz for all of them.
Fuzzing as a service vs DIY: when to hire and when to do it yourself
Run your own Foundry fuzz tests or hire a fuzzing service? The answer depends on your team, budget, and protocol complexity. Here's the decision framework.
ERC-4337 security in 2026: the state of account abstraction audits
Account abstraction changes the security model. EntryPoint trust, UserOperation validation, paymaster risks, and bundler assumptions. Here's what to audit.
LLM-generated invariant properties: what works, what hallucinates, how we use them
We've tested LLM-generated properties across dozens of engagements. Some are surprisingly good. Some are dangerously wrong. Here's what we've learned.
Fuzzing ZK circuits: testing Noir and Circom with property-based approaches
ZK circuits need testing too. Under-constrained circuits, missing range checks, and witness mismatches are the reentrancy bugs of the ZK world. Here's how to fuzz them.
Differential testing for smart contracts: comparing implementations to find bugs
Two implementations of the same spec should behave identically. When they don't, you've found a bug. Here's how to set up differential testing for smart contracts.
Why we built Chimera: write once, fuzz everywhere
Every fuzzer needs different test code. Chimera lets you write properties once and run them with Foundry, Echidna, and Medusa — no rewrites, no lock-in. Here's why we built it and how the architecture works.
Postmortem: The Lending Protocol Reentrancy That Fuzzing Missed — And Invariants Didn't
The dev team ran Echidna for 24 hours: zero findings. The same vulnerability was found by invariant testing in 90 seconds. Here's the exact reentrancy path, why mock ERC20s hide it, and the accounting properties that catch it.
5 Properties Every Smart Contract Auditor Forgets to Test
After 40+ DeFi audits, the same five invariant gaps come up every time. Not the obvious ones — accountants check totalSupply. The ones that require stateful sequences, adversarial tokens, and cross-function composition.