Evaluating Solidity support in AI coding assistants

Evaluating Solidity support in AI coding assistants

By Artem Dinaburg AI-enabled code assistants (like GitHub’s Copilot, Continue.dev, and Tabby) are making software development faster and more productive. Unfortunately, these tools are often bad at Solidity. So we decided to improve them! To make it easier to write, edit, and understand Solidity with AI-enabled tools, we have: Added ... Read More
Killing Filecoin nodes

Killing Filecoin nodes

By Simone Monica In January, we identified and reported a vulnerability in the Lotus and Venus clients of the Filecoin network that allowed an attacker to remotely crash a node and trigger a denial of service. This issue is caused by an incorrect validation of an index, resulting in an ... Read More

Fuzzing between the lines in popular barcode software

By Artur Cygan Fuzzing—one of the most successful techniques for finding security bugs, consistently featured in articles and industry conferences—has become so popular that you may think most important software has already been extensively fuzzed. But that’s not always the case. In this blog post, we show how we fuzzed ... Read More
A deep dive into Linux’s new mseal syscall

A deep dive into Linux’s new mseal syscall

| | Linux, Research Practice
By Alan Cao If you love exploit mitigations, you may have heard of a new system call named mseal landing into the Linux kernel’s 6.10 release, providing a protection called “memory sealing.” Beyond notes from the authors, very little information about this mitigation exists. In this blog post, we’ll explain ... Read More
Auditing Gradio 5, Hugging Face’s ML GUI framework

Auditing Gradio 5, Hugging Face’s ML GUI framework

| | machine learning
This is a joint post with the Hugging Face Gradio team; read their announcement here! You can find the full report with all of the detailed findings from our security audit of Gradio 5 here. Hugging Face hired Trail of Bits to audit Gradio 5, a popular open-source library that ... Read More

Securing the software supply chain with the SLSA framework

| | Application Security
By Cliff Smith Software supply chain security has been a hot topic since the Solarwinds breach back in 2020. Thanks to the Supply-chain Levels for Software Artifacts (SLSA) framework, the software industry is now at the threshold of sustainably solving many of the biggest challenges in securely building and distributing ... Read More

A few notes on AWS Nitro Enclaves: Attack surface

By Paweł Płatek In the race to secure cloud applications, AWS Nitro Enclaves have emerged as a powerful tool for isolating sensitive workloads. But with great power comes great responsibility—and potential security pitfalls. As pioneers in confidential computing security, we at Trail of Bits have scrutinized the attack surface of ... Read More
Introduction to Semgrep

Announcing the Trail of Bits and Semgrep partnership

| | Semgrep, Testing Handbook
At Trail of Bits, we aim to share and develop tools and resources used in our security assessments with the broader security community. Many clients, we observed, don’t use Semgrep to its fullest potential or even at all. To bridge this gap and encourage broader adoption, our CEO, Dan Guido, ... Read More
AI/MLs Role in Cybersecurity: Balancing Innovation & Safety

Inside DEF CON: Michael Brown on how AI/ML is revolutionizing cybersecurity

| | AIxCC, machine learning
At DEF CON, Michael Brown, Principal Security Engineer at Trail of Bits, sat down with Michael Novinson from Information Security Media Group (ISMG) to discuss four critical areas where AI/ML is revolutionizing security. Here’s what they covered: AI/ML techniques surpass the limits of traditional software analysis As Moore’s law slows ... Read More
Friends don’t let friends reuse nonces

Friends don’t let friends reuse nonces

| | cryptography
By Joe Doyle If you’ve encountered cryptography software, you’ve probably heard the advice to never use a nonce twice—in fact, that’s where the word nonce (number used once) comes from. Depending on the cryptography involved, a reused nonce can reveal encrypted messages, or even leak your secret key! But common ... Read More