Syndicated Blog

Trail of Bits Blog
Since 2012, Trail of Bits has helped secure some of the world’s most targeted organizations and products. We combine high-­end security research with a real­ world attacker mentality to reduce risk and fortify code.
Evaluating Solidity support in AI coding assistants

Evaluating Solidity support in AI coding assistants

By Artem Dinaburg AI-enabled code assistants (like GitHub’s Copilot, Continue.dev, and Tabby) are making software development faster and more productive. Unfortunately, these tools are often bad at Solidity. So we decided to ...
Attestations: A new generation of signatures on PyPI

Attestations: A new generation of signatures on PyPI

| | Uncategorized
Read the official announcement on the PyPI blog as well! For the past year, we’ve worked with the Python Package Index (PyPI) on a new security feature for the Python ecosystem: index-hosted ...
Killing Filecoin nodes

Killing Filecoin nodes

By Simone Monica In January, we identified and reported a vulnerability in the Lotus and Venus clients of the Filecoin network that allowed an attacker to remotely crash a node and trigger ...

Fuzzing between the lines in popular barcode software

By Artur Cygan Fuzzing—one of the most successful techniques for finding security bugs, consistently featured in articles and industry conferences—has become so popular that you may think most important software has already ...
A deep dive into Linux’s new mseal syscall

A deep dive into Linux’s new mseal syscall

| | Linux, Research Practice
By Alan Cao If you love exploit mitigations, you may have heard of a new system call named mseal landing into the Linux kernel’s 6.10 release, providing a protection called “memory sealing.” ...
Auditing Gradio 5, Hugging Face’s ML GUI framework

Auditing Gradio 5, Hugging Face’s ML GUI framework

| | machine learning
This is a joint post with the Hugging Face Gradio team; read their announcement here! You can find the full report with all of the detailed findings from our security audit of ...

Securing the software supply chain with the SLSA framework

| | Application Security
By Cliff Smith Software supply chain security has been a hot topic since the Solarwinds breach back in 2020. Thanks to the Supply-chain Levels for Software Artifacts (SLSA) framework, the software industry ...

A few notes on AWS Nitro Enclaves: Attack surface

By Paweł Płatek In the race to secure cloud applications, AWS Nitro Enclaves have emerged as a powerful tool for isolating sensitive workloads. But with great power comes great responsibility—and potential security ...
Introduction to Semgrep

Announcing the Trail of Bits and Semgrep partnership

| | Semgrep, Testing Handbook
At Trail of Bits, we aim to share and develop tools and resources used in our security assessments with the broader security community. Many clients, we observed, don’t use Semgrep to its ...
AI/MLs Role in Cybersecurity: Balancing Innovation & Safety

Inside DEF CON: Michael Brown on how AI/ML is revolutionizing cybersecurity

| | AIxCC, machine learning
At DEF CON, Michael Brown, Principal Security Engineer at Trail of Bits, sat down with Michael Novinson from Information Security Media Group (ISMG) to discuss four critical areas where AI/ML is revolutionizing ...