Attacking Reasoning models​
|

Attacking Reasoning models​

DeepSeek R1 & Claude LLM vulnerabilities Attacking Reasoning models In recent months, reasoning models have gained significant attention, particularly with the emergence of DeepSeek R1, which aim to improve logical consistency and step-by-step problem-solving in LLMs. At the core of these advancements is Chain of Thought (CoT) reasoning, a technique that enables models to break…

BGP Under Pressure : Protocol Fuzzing in action
| |

BGP Under Pressure : Protocol Fuzzing in action

BGP Under Pressure Protocol Fuzzing in action When it comes to keeping the internet running smoothly, the Border Gateway Protocol (BGP) is absolutely essential. BGP is the backbone of how routers share the best paths for data across different networks. Given its importance, even small bugs can cause big headaches. That’s why we’ve been busy…

How Fuzzing Could Have Prevented the zkLend Hack​
| | | |

How Fuzzing Could Have Prevented the zkLend Hack​

rediscovery of the starknet zklend hack How Fuzzing Could Have Prevented the zkLend Hack The recent zkLend hack has stirred up significant discussion in the community, and today we’d like to share some insights from our deep dive into the vulnerability using fuzzing techniques at FuzzingLabs. Our investigation reveals that a simple fuzzing test could…

Story Security Assessment Completed
| | | | |

Story Security Assessment Completed

Story / Security Assessment Completed Strengthening Blockchain-Based IP Management At FuzzingLabs we recently completed a comprehensive security assessment of Story, a decentralized network that aims to revolutionize intellectual property (IP) management. This audit was undertaken to ensure the security and resilience of its blockchain-based infrastructure, smart contracts, and consensus mechanisms. Below, we provide an overview…

DOS in DeFi Liquidity Pools: The Initialization Vulnerability
| | |

DOS in DeFi Liquidity Pools: The Initialization Vulnerability

Denial Of Service in DeFi Liquidity Pools The Initialization Vulnerability Decentralized Exchanges (DEXs) have become a cornerstone of the DeFi ecosystem, processing billions in daily trading volume. However, during our recent security research at FuzzingLabs we uncovered a subtle yet significant vulnerability pattern that affects multiple DEX implementations. This vulnerability allows malicious actors to effectively…

GreHack CTF – Casting reverse challenge into cryptanalysis challenge​
| |

GreHack CTF – Casting reverse challenge into cryptanalysis challenge​

Grehack ctf WRITEUP Casting reverse challenge into cryptanalysis challenge In mid-November, I participated in the GreHack CTF with my team (Phreaks 2600), and the challenge I will present was one of the problems featured in the competition. Interestingly, only two other teams managed to solve it, this makes it a particularly intriguing challenge, categorized under…

Sponge Trouble: When Poseidon Gets Absorbed in Its Own Bugs
| | | | |

Sponge Trouble: When Poseidon Gets Absorbed in Its Own Bugs

Poseidon Sponge Bugs in ArkWorks Avoiding Cryptographic Failures in Hashing We found two subtle yet impactful bugs in the ArkWorks library’s implementation of the Poseidon Sponge. This discovery highlights the complexity and precision required in cryptographic implementations. In this article, we’ll first explain what Poseidon Sponge is, how it works, and then delve into the…

Uncovering a Subtle Bug in EVM Arithmetic: The Case of Negating Zero
| | | |

Uncovering a Subtle Bug in EVM Arithmetic: The Case of Negating Zero

Uncovering a Subtle Bug in Ethereum Virtual Machine (EVM) The Case of Arithmetic Negating Zero Our team at FuzzingLabs has been auditing the Ethereum Virtual Machine (EVM) implementation by LambdaClass. Throughout the audit, we’ve identified several vulnerabilities, but in this post, we’ll focus on one particularly interesting issue involving the SDIV operation and its handling…

cairo smart contract vulnerability starknet sierra starkware l1 l2 thoth
| |

Top Vulnerabilities in Cairo Smart Contracts: Detection and Remediation

Top 4 Vulnerabilities in Cairo/Starknet Smart Contracts Detection and Remediation What is Cairo ? In 2021, StarkWare introduced Cairo, a programming language designed for creating provable programs using zero-knowledge proofs. It serves as the smart contract language for Starknet, a layer-2 blockchain built on top of Ethereum. This article explores some of the most common…