Recon Logo

Audits

Pro

Case Studies

Team

Blog

VULNERABILITIES

1 article tagged "vulnerabilities"

2025-02-24·12 min read

How We Found Real Vulnerabilities with Fuzzing

A technical deep-dive into real vulnerabilities we've found through fuzzing, from critical accounting bugs to subtle rounding exploits. Includes the properties that caught them.

By Antonio
fuzzingvulnerabilitiessmart-contract-security

Need help securing your protocol?

RECON

Cloud-powered invariant testing and security auditing for DeFi protocols. Trusted by leading teams.

Product

Recon Pro

Request an Audit

AI Audits Demo

Dashboard

Docs

Tools

All Tools

Medusa Scraper

Echidna Scraper

Halmos Scraper

Test Builder

Resources

Case Studies

Team

Learn

Blog

Media

Bootcamp

Comparisons

FAQ

Company

Talk to Founder

Sales

Live Exploit Prevention

Dynamic Replacement

Ready to ship safer code?

Start with a free consultation or try Recon Pro today.

© 2026 Recon Fuzz. All rights reserved.

Privacy Policy

Terms of Service