Understanding Smart Contract Exploits & Advanced Fuzzing Framework

December 1, 2025

Part A: Understanding Exploits & Challenges of Smart Contract Fuzzing

Key Insights and Core Concepts

Value Extraction Exploit: At its core, exploits in DeFi are characterized by a two-step optimization process:

  1. Sequence generation: Deciding which state-changing smart contract functions to invoke and in what order.
  2. Parameter mutation: Continuously optimizing input parameters for these functions to trigger vulnerabilities.

Challenges of Smart Contract Fuzzing in Testcase Generation

Current Approach for Testcase Generation

Challenges of Smart Contract Fuzzing in Input Parameters Generation

Current Approach for Input Parameter Generation

Fuzzing Jargon and Framework

Part B: Proposed Solution - Three-Layer Fuzzing Framework

1. Language Model (LM)-Guided Fuzzing

Use LLMs for static and dynamic analysis to guide fuzzing intelligently. Four key components:

Example: Using an LLM to identify vulnerable code lines and map them to control flow graph (CFG) basic blocks to target fuzzing efforts. LLM aids in linking caller and callee functions, understanding which input parameters affect nested calls—crucial for mutating the correct parameters in complex functions like batchSwap.

2. State-Based Fuzzing Approach

CFG-guided fuzzing with three phases:

3. GPU-Accelerated EVM Execution


This recap is intentionally concise — the full talk goes much deeper. Watch it here if you want the unfiltered version.

I'm genuinely curious:

Drop it in the replies or DM me!

← Back to Writings