Back to blogs
Written by
Vasiliy Gualoto
Published on
February 1, 2024

What is fuzzing (fuzz tests) - Cybersecurity and Smart Contracts

What is fuzz testing? In this guide, you will learn everything you need to know about smart contracts fuzzing and invariants testing using foundry.

Table of Contents

This article will teach you everything you need to know to understand a key testing strategy, crucial when it comes to ensuring the reliability of your systems:

Smart contracting Fuzzing (fuzz testing) and invariant testing.

Throughout this guide and its examples, we’ll explore how we can test our invariants and smart contract functions using fuzz testing and Foundry while addressing and uncovering complex and often subtle aspects of smart contract behaviours.

Want to level up your smart contract security skills? Take our 20+ hours smart contract auditing course on Cyfrin Updraft, completely free!

Here's a video with Troy, Trail of Bits security engineer, explaining what is fuzzing and how it works.

The first thing to understand why fuzzing is important, is understanding what an invariant is. Let’s find out.

What is an invariant?

Smart contract testing includes various methods to enhance smart contracts' on-chain security and efficiency. We test to ensure that a smart contract always behaves as expected across different scenarios to avoid unexpected events and exploits.

Invariant testing involves defining a set of conditions - invariants - that must always hold, regardless of the contract's state or input.

Invariant testing always requires:

  • Invariant definition: Identifying crucial conditions that must always remain true for proper contract functionality.
  • State analysis: This process rigorously examines the contract under diverse states and input scenarios. The aim is to ensure that the defined invariants remain valid and un-breached throughout these conditions.

Note: Foundry often categorizes an invariant test as a stateful fuzz test.

In DeFi protocols, for example, a good invariant might be:

  • The protocol must always be over-collateralized
  • A user should never be able to withdraw more money than they deposited
  • There can only be 1 winner of the fair lottery

Once we have found our invariants, it’s time to test them and test the thesis that “they should always hold”, hence, they should never change status.

One way we can test them is through simple unit tests, but there’s a problem, that fuzz testing solves, you’ll see in the next section.

Why isn’t unit testing invariants using Foundry a good idea?

Let’s take into consideration a simple function in a smart contract called SimpleStorage.

//SPDX-License-Identifier: MIT

pragma solidity ^0.8.12;

contract SimpleStorage {
		// The inviariant is defined bellow 👇👇👇
    uint8 public storedData;

    function setAddition(uint8 x) public {
        storedData = x * 2;
    }
}

The function setAddition multiplies any input number by 2.

Our invariant or “property of the system that should always hold”, in this case, will be:

  • storedData should never revert

Simply put, we could say our invariant is:


Invariant: `storedData` MUST never REVERT

You can find a list of invariants (properties) of popular smart contract standards in this GitHub repo.

Now, using Foundry, let’s write a traditional unit test for this contract, and check that our invariant holds:




pragma solidity ^0.8.13;

import "forge-std/Test.sol";
import "../src/SimpleStorage.sol";

contract SimplestorageTest is Test {
    SimpleStorage simpleStorage;

    function setUp() public {
        simpleStorage = new SimpleStorage();
    }

    function testAddsWithoutRevert() public {
        uint8 testValue = 100;
        simpleStorage.setAddition(testValue);
        (bool success, ) = address(simpleStorage).call(
            abi.encodeWithSignature("setAddition(uint8)", testValue)
        );
        assert(success);
    }
}

In this testing scenario, we initialize a test variable named testValue to pass to our setAddition function and assign it a value of 100.

After executing the function, we use assert to make sure the function has returned successfully:

image showing invariant test on smart contract

Nice! In this case, our unit invariant test using Foundry tells us that a value of 100 won't break the invariant.

What is not telling us, though, is that any value from 128 and above will indeed break our invariant, overflowing our uint8 storedData variable:


function testAddsWithoutRevert() public {
				// Here we explicitly set a value that will break the invariant
        // 👇👇👇
        uint8 testValue = 128;
        simpleStorage.setAddition(testValue);
        (bool success, ) = address(simpleStorage).call(
            abi.encodeWithSignature("setAddition(uint8)", testValue)
        );
        assert(success);
    }

If we rerun the test, this will make the transaction revert and throw the overflow error:

image showing invariant unit test not uncovering the issue

As you can see, unit testing invariants aren't effective. In non-obvious situations, configuring parameters individually to identify every case under which a value testValue triggers an "arithmetic underflow or overflow" error is time-consuming, if not impossible, or inconvenient.

That’s where fuzz testing or fuzzing, comes in. Let's understand what fuzz testing is.

What is fuzzing (fuzz testing)?

Fuzz testing lifts the need to manually test every possible value a variable, such as testValue, might assume.

So, what is fuzz testing?

Fuzzing enables us to systematically input random data into tests to break specific assertions (functions). By automating the randomization of the input we pass into functions inside our tests, we streamline the process significantly and catch scenarios we wouldn’t otherwise.

Having that said, there are two types of fuzz testing: stateless and stateful fuzzing.

How does stateless Fuzzing work?

Stateless fuzzing would be similar to doing something to a balloonA in one random attempt to break it, then blowing up a new balloonB and attempting to break it differently.

Here, you’d never try to break a balloon you already tried to break in the past. This seems a little silly as if our balloon invariant is that “the balloon can’t be popped” we’d want to make multiple attempts on the same balloon.

We can see an example of a stateless fuzz test using Foundry in the testFuzzRevertOnOverflow example below:


function testFuzzRevertOnOverflow(uint8 testValue) public {
        // uint8 testValue; 👈 This value gets commented
        simpleStorage.setAddition(testValue);
    }

In this example, we’re not declaring the testValue variable anymore. Instead, we pass it as an argument to the function, that Foundry will generate and pass at runtime.

As soon as we run our test, it will fail, indicating the input used to break the test:

Image showing a fuzz test (fuzzing) breaking the invariant at the first try

As you can see, together with the number used to break our function, there’s another parameter: “runs” - let’s see what it means.

Runs and counterexamplesThe runs count in the example above, indicates the number of randomly generated inputs. In this example, our fuzzer had to generate 3 random different inputs for testValue to find a value that breaks our invariant.

The value that our fuzz test found as an example that breaks our invariant is known as Counterexample an input that breaks our property or invariant.

How did the fuzz test find the counterexample with 3 runs?

- It ran the unit test with some number, and that number passed the test.

- it chose another number

- It chose 128 and it failed!

Because our fuzz test tried 3 different numbers, we say it did 3 runs. Sometimes, a fuzz test will try thousands of potential counterexamples, and none of them will work because there isn’t a bug! When that happens, a developer might end up waiting forever.

We usually give our tool a maximum number of runs to mitigate this. In Foundry, we can find the maximum number of runs in the foundry.toml

image showing how to set fuzz runs (umber of times a fuzz test should run) using foundry.toml

As we said before, this test is categorized as stateless because the storedData variable (our balloon) is reset to its default value of 0 after each iteration.

How does Stateful Fuzzing work?

On the other hand, when the variable's state is retained across multiple runs, such as the counter value in this scenario, the test transforms into a stateful fuzz test.

So in the balloon example, we will make different attempts to break it but use the same balloon on each iteration.

In another smart contract scenario, let’s establish a new invariant named alwaysEvenNumber. The core condition of this invariant is that the number must always be even, never odd.

To illustrate the concept, we add a new variable called hiddenValue. This variable’s value is added in the function and equals to the inputNumber value.

If hiddenValue equals 8, then alwaysEvenNumber is set to 3. This action violates the invariant as it’s supposed to maintain an even number status:


// SPDX-License-Identifier: MIT
pragma solidity ^0.8.12;

contract AlwaysEven {
    uint256 public alwaysEvenNumber;
    uint256 public hiddenValue;

    function setEvenNumber(uint256 inputNumber) public {
        if (inputNumber % 2 == 0) {
            alwaysEvenNumber += inputNumber;
        }

        // This conditional will break the invariant which must be always be even
        // 👇👇👇 in a stateless scenario this will never be tru, because hiddenValue will be Always 0
        if (hiddenValue == 8) {
            alwaysEvenNumber = 3;
        }

        // We set the hiddenValue to the inputNumber at the end of the function
        // In a stateful scenario, this value will be remembered for the next call

        hiddenValue = inputNumber;
    }
}

In a stateless setup, where hiddenValue resets to 0 for each execution, the specific condition we've set will not activate.

However, similar to our balloon analogy, in a stateful fuzz test, we repeatedly use the same "balloon", where the variable's previous value is retained, allowing us to uncover potentially more systemic issues.

Unlike stateless fuzzing, the test will not require us to set up the random input parameter on the function declaration.

Instead, by importing StdInvariant.sol we can set a targetContract, Foundry will then take care of automatically triggering random functions of the contract using random parameters and remember its previous state.

Here’s how we would write this test.


// SPDX-License-Identifier: MIT

import {Test} from "forge-std/Test.sol";
import {AlwaysEven} from "../src/AlwaysEven.sol";

// We need to import the invariant contract from forge-std
import {StdInvariant} from "forge-std/StdInvariant.sol";

pragma solidity ^0.8.12;

contract AlwaysEvenTestStateful is StdInvariant, Test {
    AlwaysEven alwaysEven;

    function setUp() public {
        alwaysEven = new AlwaysEven();
        // we must define the target contract which is going to start executing the functions with random inputs
        targetContract(address(alwaysEven));
    }

    function invariant_testsetEvenNumber() public view {
        assert(alwaysEven.alwaysEvenNumber() % 2 == 0);
    }
}

AlwaysEven just has one function, so it will just call setEvenNumber with different values and assert if the value returned by the function will remain even.

As we can notice, running our stateful fuzz test using foundry, we were able to randomly values to the function, until 8 was used as an argument changing the AlwaysEven value to 3, ultimately breaking our invariant rule. Again, this is a very simple use case, but in real-world applications finding the value that will break an invariant won’t be that intuitive, making stateful fuzz tests the fastest, sometimes the only, solution.

image showing the effectiveness of stateful fuzz testing or fuzzing in brea

A note on different test types of fuzz and invariant testing

When it comes different types of tests, terminology can be confusing.

For instance, Foundry often categorizes an invariant test as a stateful fuzz test, even though we have demonstrated testing an invariant using a stateless fuzz test in this article.

Additionally, while the term invariant can be used in the context of a stateful test, it's not mandatory and even confusing sometimes, because as you saw we created a unit test also using invariants.

To clarify these distinctions, here's a detailed graph by Nisedo outlining the various test types:

Image showing different types of smart contract tests and their differences

Best Fuzz testing (fuzzing) tools for smart contract auditors

To conclude, here's a list of the best fuzzers, fuzz testing tools, for smart contract auditors.

Echidna: Focused on Fuzz Testing

Echidna, developed by Trail of Bits for Ethereum smart contracts, specializes in fuzz testing and is known for its efficacy in vulnerability detection.

  • Functionalities: Generates diverse inputs to scrutinize contract functions, revealing concealed flaws.
  • User Accessibility: Designed for ease of use, accommodating developers of varying expertise.
  • CI Integration Capability: Facilitates integration into continuous integration workflows for ongoing testing.

Medusa: Emerging Smart Contract Fuzzer

Medusa is a Go-Ethereum-based fuzzer for smart contracts, inspired by Echidna. It enables parallelized fuzz testing through its CLI and Go API, facilitating a user-extended testing approach.

  • Functionalities: Medusa supports parallel fuzzing across multiple workers, built-in assertion and property testing, mutational value generation, and coverage collecting.
  • Coverage Techniques: Implements coverage-guided fuzzing, using increasing call sequences from a corpus to guide the fuzzing campaign.
  • Extensibility: Offers an extensible low-level testing API with events and hooks, although the high-level testing API is still under development.

Foundry: Versatile Testing Suite

Foundry stands out for its comprehensive support of both fuzz and invariant testing and is the framework we used for all of the examples above.

  • Fuzz Testing Tools: Simplifies writing and executing fuzz tests seamlessly, integrating them with unit testing.
  • Invariant Testing Features: Equipped for defining and validating invariants during tests.
  • Community and Documentation Support: Extensive resources and an active user base make it a preferred choice for developers.

Conclusion

Adopting fuzz and invariant testing transcends standard practice in smart contract development—it's a vital necessity.

In this article you've learned what is fuzz testing (fuzzing) and how it works. If you want to implement fuzz tests using Foundry, checkout our full tutorial.

These methods highly elevate contract security and reliability in the blockchain realm. Fuzz testing, with tools like Echidna, exposes contracts to a vast range of inputs, unearthing hidden vulnerabilities. Invariant testing, facilitated by platforms like Foundry, ensures contracts uphold logical consistency under various conditions.

This is the new floor for security in web3, if you want to become a top-tier, best-paid auditor in the industry you must understand and apply techniques like this one on a daily basis and the best Blockchain Developers out there must also nail these techniques to build more robust, secure and reliable protocols.

Secure your protocol today

Join some of the biggest protocols and companies in creating a better internet. Our security researchers will help you throughout the whole process.
Stay on the bleeding edge of security
Carefully crafted, short smart contract security tips and news freshly delivered every week.