Skip to content
Nullcon Goa

Writing a Bug Printer Engine From Scratch


Course
Upgrade subscription below

Daniel Schmidt and Kevin Valerio of Security Research Labs examine how coverage-guided fuzzing uncovers hidden logic flaws in Rust smart contracts running on WebAssembly.

Rust-based smart contracts promise performance and memory safety, yet subtle logic flaws, concurrency errors and state-handling weaknesses continue to threaten on-chain assets. WebAssembly execution, deterministic constraints and contract-specific APIs introduce challenges that standard fuzzing approaches cannot address directly. A purpose-built strategy is required to validate contract behavior across complex execution paths while preserving realistic blockchain state. Coverage feedback, instrumentation choices and valid input generation all shape the effectiveness of smart contract fuzzing. Emerging tooling demonstrates how property-based techniques and coverage guidance can expose exploitable conditions before deployment, improving assurance for Rust contracts built with ink! and deployed across modern blockchain ecosystems.

In this session, you will learn:

  • Why traditional fuzzing techniques fall short for WebAssembly smart contracts;
  • Instrumentation strategies for capturing execution coverage in sandboxed environments;
  • Generating valid, state-aware inputs for contract execution paths.

Here is the course outline:

Fuzzing Rust Smart Contracts: Writing a Bug Printer Engine From Scratch

Completion

The following certificates are awarded when the course is completed:

CPE Credit Certificate

Floating Button