ConsenSys releases ‘fuzzing’ tool to test smart contract vulnerabilities
2 min readBlockchain technology firm ConsenSys publicly released its “Diligence Fuzzing” tool for smart contract testing, according to an Aug. 1 announcement. The new tool produces “random and invalid data points” to find vulnerabilities in contracts before they are launched.
Over $2.8 billion was
In a conversation with Cointelegraph, ConsenSys security services lead Liz Daldalian explained how the tool works in more detail. Developers can annotate their contracts using a machine language called “Scribble,” also developed by ConsenSys. Once they do this, the annotations will be understood by the fuzzing tool. The tool produces “unexpected” inputs so as to test whether the contract can be forced to produce unintended actions.
ConsenSys security researcher Gonçalo Sá said the tool is not a “black box fuzzer.” It does not produce completely random data. Instead, it is a “grey-box fuzzer” that employs an understanding of the program’s current state to reduce the types of data produced, increasing the tool’s efficiency.
Sá has seen developers becoming more interested in fuzzing recently. As Foundry has become more popular, developers have started to use its default black-box fuzzer and have grown accustomed to using it. On the other hand, some users want a more sophisticated fuzzer than the default one, which he argued Diligence Fuzzer could provide. He said:
“People are now trying to harness the power of the different types of security tools that they have in their hands. And Foundry [has] a black box fuzzer that is really easy to use. […] So people now are starting to understand the power of fuzzing. […] And they are looking for more powerful tools.”
Smart contract hacks have continued to pose a problem for users. Excluding rug pulls and phishing scams, over $471.43 million was lost from Web3 security vulnerabilities in the first half of 2023. Daldalian cautioned that Diligence Fuzzing is not a “silver bullet” that would eliminate all smart contract hacks. However, she argued that it is “one tool in an arsenal that developers can use in order to write more secure smart contracts,” which can at least set the Web3 community on a path to minimize losses from these attacks.