04-06, 15:30–16:30 (Europe/Zurich), Merge Stage
Fuzzing is a powerful testing technique that uses random inputs to a tested program. It can uncover edge cases developers overlook and detect bugs often missed by manual review. However, many web3 developers underestimate the need for fuzz tests and deploy their projects without them. This workshop is created to show how simple it may be to create and run fuzz tests for your projects.
For our workshop, we will use the Solidity code of a smart contract optimized with Yul and containing unobvious errors. First, we will compare different fuzzing approaches and tools focusing on guided fuzzing. Next, we will create a fuzz test for the code from scratch that we will run locally. Finally, we will evaluate the outputs and discuss how fuzzing can be used for bigger projects.
At the workshop, the attendees will gain the knowledge and skills necessary to integrate fuzz tests into their development workflows and add another layer of security to their projects. We aim to make web3 safer and welcome all developers and security researchers to join us in this workshop.
Fuzzing is a powerful testing technique that uses random inputs to a tested program. It can uncover edge cases developers overlook and detect bugs often missed by manual review. However, many web3 developers underestimate the need for fuzz tests and deploy their projects without them. This workshop is created to show how simple it may be to create and run fuzz tests for your projects.
For our workshop, we will use the Solidity code of a smart contract optimized with Yul and containing unobvious errors. First, we will compare different fuzzing approaches and tools focusing on guided fuzzing. Next, we will create a fuzz test for the code from scratch that we will run locally. Finally, we will evaluate the outputs and discuss how fuzzing can be used for bigger projects.
At the workshop, the attendees will gain the knowledge and skills necessary to integrate fuzz tests into their development workflows and add another layer of security to their projects. We aim to make web3 safer and welcome all developers and security researchers to join us in this workshop.
Andrey is an Ethereum Security Researcher @ Ackee Blockchain Security. He audited such protocols as Axelar or Squid, focusing on both manual review and automated security testing.