Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Etheno serves as a versatile tool for Ethereum testing, acting as a JSON RPC multiplexer, an analytical tool wrapper, and a mechanism for test integration. It simplifies the challenges associated with configuring analysis tools such as Echidna, particularly for extensive multi-contract projects. Smart contract developers are encouraged to leverage Etheno for thorough contract testing, while Ethereum client developers can utilize it for effective differential testing of their implementations. By operating an efficient JSON RPC server, Etheno can route calls to multiple clients seamlessly. It also offers an API that allows for the filtering and alteration of JSON RPC calls, facilitating differential testing by dispatching JSON RPC sequences across various Ethereum clients. Furthermore, Etheno allows users to deploy and engage with multiple networks simultaneously and integrates smoothly with popular testing frameworks like Ganache and Truffle. With the capability to launch a local test network using a single command, Etheno ensures ease of setup. Users can also take advantage of a prebuilt Docker container for a quick installation and trial of Etheno. Given its versatility, Etheno offers a wide array of command-line arguments, catering to diverse testing needs and preferences. This flexibility makes it an invaluable resource for anyone involved in Ethereum development.
Description
LibFuzzer serves as an in-process, coverage-guided engine for evolutionary fuzzing. By being linked directly with the library under examination, it injects fuzzed inputs through a designated entry point, or target function, allowing it to monitor the code paths that are executed while creating variations of the input data to enhance code coverage. The coverage data is obtained through LLVM’s SanitizerCoverage instrumentation, ensuring that users have detailed insights into the testing process. Notably, LibFuzzer continues to receive support, with critical bugs addressed as they arise. To begin utilizing LibFuzzer with a library, one must first create a fuzz target—this function receives a byte array and interacts with the API being tested in a meaningful way. Importantly, this fuzz target operates independently of LibFuzzer, which facilitates its use alongside other fuzzing tools such as AFL or Radamsa, thereby providing versatility in testing strategies. Furthermore, the ability to leverage multiple fuzzing engines can lead to more robust testing outcomes and clearer insights into the library's vulnerabilities.
API Access
Has API
API Access
Has API
Integrations
Atheris
C
C++
ClusterFuzz
Docker
Echidna
Ethereum
Fuzzbuzz
Google ClusterFuzz
JSON
Integrations
Atheris
C
C++
ClusterFuzz
Docker
Echidna
Ethereum
Fuzzbuzz
Google ClusterFuzz
JSON
Pricing Details
Free
Free Trial
Free Version
Pricing Details
Free
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Crytic
Country
United States
Website
github.com/crytic/etheno
Vendor Details
Company Name
LLVM Project
Founded
2003
Website
llvm.org/docs/LibFuzzer.html