Trail of Bits Profile Banner
Trail of Bits Profile
Trail of Bits

@trailofbits

31,880
Followers
247
Following
287
Media
3,460
Statuses

We help secure the world’s most targeted organizations and products. We combine security research with an attacker mentality to reduce risk and fortify code.

New York, NY
Joined March 2010
Don't wanna be here? Send us removal request.
Pinned Tweet
@trailofbits
Trail of Bits
2 months
Check out our ‘Fuzzing February’ Newsletter: we published a fuzzing chapter to our Testing Handbook, fuzzed Python, and added a smart fuzzer on top of Cosmos SDK.
1
12
30
@trailofbits
Trail of Bits
4 months
Today, we are disclosing LeftoverLocals, a vulnerability that allows listening to LLM responses through leaked GPU local memory created by another process on Apple, Qualcomm, AMD, and Imagination GPUs (CVE-2023-4969)
11
237
969
@trailofbits
Trail of Bits
2 months
Today we’re releasing weAudit, the VSCode extension we use during secure code reviews to collaboratively take notes and highlight code regions.
Tweet media one
17
162
583
@trailofbits
Trail of Bits
2 years
For the last year, a 9-person team from @trailofbits has deeply studied the security of blockchains for @DARPA . Today, our analysis and tools are public:
94
294
599
@trailofbits
Trail of Bits
5 years
Fuck RSA
Tweet media one
11
137
454
@trailofbits
Trail of Bits
1 year
Today, we are releasing RPC Investigator, made for exploring RPC clients and servers on Windows. This .NET application builds on the NtApiDotNet platform, adding features that offer a new way to explore RPC
7
162
423
@trailofbits
Trail of Bits
2 years
Your code might be vulnerable! Our cryptography team has discovered a number of Fiat-Shamir vulnerabilities affecting proof systems such as Bulletproofs and PlonK. Check out this blog series for details and contact us if you think your codebase might be…
12
132
383
@trailofbits
Trail of Bits
6 months
Event Tracing for Windows (ETW) is crucial for modern EDR solutions. But what do you really know about its internal workings? Dive into ETW to discover useful attack targets and forensic information.
2
134
375
@trailofbits
Trail of Bits
10 months
We’re thrilled to announce our new Testing Handbook, which gathers insights we gained over years of experience using static and dynamic analysis tools. It goes beyond standard documentation, focusing on giving the right answers rather than all the answers.
1
87
363
@trailofbits
Trail of Bits
7 years
Microsoft didn’t sandbox Windows Defender, so I did
5
229
315
@trailofbits
Trail of Bits
6 years
It's easy to find bugs when you know how to build the right tools. Check out our blog to learn how to model vulnerabilities with Binary Ninja's MLIL and SSA form.
Tweet media one
2
132
303
@trailofbits
Trail of Bits
6 years
Check out our _accessible_ Meltdown and Spectre explainer, made for developers without a background in computer architecture. No awkward analogies, we stick to the real details.
Tweet media one
0
172
300
@trailofbits
Trail of Bits
8 years
How to instantly exploit 2000 binaries with Binary Ninja
Tweet media one
1
197
288
@trailofbits
Trail of Bits
3 months
We’re releasing a Ghidra extension, BTIGhidra, that automatically recovers types with inter-procedural analysis and enhances decompilation for improved reverse engineering comprehension.
Tweet media one
3
74
287
@trailofbits
Trail of Bits
1 year
We've just released , a revamp of our guide to building secure contracts! It contains security guidelines, best practices, tool tutorials, and many other resources.
6
71
271
@trailofbits
Trail of Bits
2 years
Over the years, we have accumulated advanced knowledge and guidance for writing better smart contracts. We are sharing this knowledge in the first release of building-secure-contracts: Check out the repo to learn about best practices and tooling!
15
80
261
@trailofbits
Trail of Bits
6 years
Today we released Echidna, our next generation EVM smart fuzzer at #EthCC . It's the first-ever fuzzer to target smart contracts!
Tweet media one
6
138
245
@trailofbits
Trail of Bits
5 years
Destroying x86_64 instruction decoders with differential fuzzing
Tweet media one
4
106
235
@trailofbits
Trail of Bits
1 year
Process reparenting is a Windows technique used by malicious actors, but it can also be a benign, legitimate event. @yarden_shafir has insights on how to investigate this behavior
0
89
197
@trailofbits
Trail of Bits
1 year
As smart contract security evolves, property-based fuzzing has become a go-to technique for developers and security engineers. To help the community define properties, we are releasing a set of 168 pre-built properties that can be used to guide Echidna.
5
47
192
@trailofbits
Trail of Bits
7 years
Reverse engineer 200 binaries with the mechanical efficiency of symbolic execution
Tweet media one
0
94
186
@trailofbits
Trail of Bits
7 months
We’re launching a new service: invariant development. We’ll identify, implement, and test security-critical invariants to prevent bugs & secure your codebase over the long term. Plus, we’ll upskill your team to write their own invariants!
6
40
186
@trailofbits
Trail of Bits
2 years
We found critical flaws in common TSS libraries, a cryptographic protocol for distributed key generation and signing. We’ve released to help secure the rapidly advancing field of ZKPs, TSS, and similar schemes.
6
59
185
@trailofbits
Trail of Bits
5 years
wen eta is now
Tweet media one
8
62
179
@trailofbits
Trail of Bits
3 months
Warning: @lfgexchange is falsely claiming to have worked with us on an audit. The report on their page is fake. If you want to verify the authenticity of a @trailofbits report, find it on our publications repo, the authoritative source straight from us.
Tweet media one
16
42
181
@trailofbits
Trail of Bits
1 year
A new release of Slither is available, which now uses OpenAI's Codex to auto-generate solidity documentation and leverages GPT-3 to find vulnerabilities.
1
34
176
@trailofbits
Trail of Bits
1 year
During research that led to our discovery of a vuln in SQLite, we found something we call "divergent representations." Once we started looking for them, we found them everywhere
3
41
168
@trailofbits
Trail of Bits
2 years
There's a dark side to compiler optimizations that can inadvertently cause information leaks or remove code critical to security. Read about the research being done to mitigate this risk and reduce the exposure to code-reuse attacks in software.
4
55
164
@trailofbits
Trail of Bits
7 years
Devirtualizing C++ with Binary Ninja
Tweet media one
0
105
157
@trailofbits
Trail of Bits
6 years
Protecting Software Against Exploitation with DARPA’s CFAR
Tweet media one
1
81
158
@trailofbits
Trail of Bits
6 years
We published a technical summary of the "AMD Flaws" so they can be of use to the security community without the distraction of the surrounding disclosure issues.
4
131
156
@trailofbits
Trail of Bits
6 months
The @raft_fi issue is complex and we're actively investigating it. We've offered to help their team however we can. Here's some of what we know so far:
2
23
157
@trailofbits
Trail of Bits
3 months
Fuzz smarter, not harder, with our newest Testing Handbook chapter that will take your fuzzing skills from 0 to 60.
Tweet media one
1
34
154
@trailofbits
Trail of Bits
1 year
Today's release of our Echidna smart contract fuzzer is more than 20x faster, thanks to multicore support and optimized coverage collection.
Tweet media one
4
33
148
@trailofbits
Trail of Bits
9 months
The #RektTest is a simple way for blockchain teams to assess their security posture. Created by top security experts, it includes 12 key questions. Can you pass the Rekt Test?
6
36
149
@trailofbits
Trail of Bits
1 year
Why should you care about the security of VSCode extensions? How does compromising a local machine, stealing all local files from that machine, or even swiping your SSH keys sound?
1
47
147
@trailofbits
Trail of Bits
9 months
Is your centralized exchange, bridge, or L2 client using block delays to determine transaction finality? If so, it may be vulnerable to re-orgs, double-spend attacks, and stolen funds. Our new guide to blockchain finality helps you avoid these attacks.
4
29
141
@trailofbits
Trail of Bits
2 months
Today we're releasing Attacknet, a new tool in the blockchain security arsenal. Built in collaboration with the @Ethereum Foundation, it uses Chaos Engineering to test the most challenging network conditions imaginable for fault tolerance
Tweet media one
2
32
133
@trailofbits
Trail of Bits
4 years
We have a working proof-of-concept exploit for ‘Whose Curve is it Anyway?’ — NSA’s bug in Microsoft’s Crypto API. Read on for our explainer:
2
63
133
@trailofbits
Trail of Bits
10 months
Upgrading smart contracts can introduce new bugs, risking millions of dollars. We've developed Diffusc, a differential fuzzer that compares two smart contracts to uncover unexpected differences in behavior before an upgrade is deployed.
4
39
129
@trailofbits
Trail of Bits
6 months
Earlier this week, @UncipheredLLC disclosed that BitcoinJS, the most widely used JavaScript library for bitcoin wallets, relied on weak randomness until 2014. This issue puts millions of wallets at risk. Here’s what we know:
@josephmenn
Joseph Menn
6 months
Experts discover flaw leaving $1 billion in bitcoin and other cryptocurrencies exposed for stealing from early software wallets. Free link to my story in the The Post: #bitcoin #doge #infosec
1
6
32
6
28
126
@trailofbits
Trail of Bits
1 year
We’ve built many high-impact tools that we use for security reviews. But mastering them can take time. So we're bringing the mastery to you: we're going to be livestreaming tool workshops on our Twitch and YouTube channels!
12
30
120
@trailofbits
Trail of Bits
9 months
Clang isn't a toolsmith's compiler. PASTA tries to fix this by providing safe-to-use C++ and Python wrappers to the Clang AST. PASTA also answers questions that Clang can't, like how parsed tokens relate back to macro expansions and files. Learn more:
1
37
116
@trailofbits
Trail of Bits
2 years
It pays to be Circomspect
6
31
116
@trailofbits
Trail of Bits
2 months
Fuzzing is preferred over formal verification because proving the absence of bugs is usually unattainable, and fuzzing identifies the same bugs with less effort.
3
14
113
@trailofbits
Trail of Bits
6 years
Trail of Bits donates $100,000 to support young researchers through @SummerC0n
Tweet media one
3
32
112
@trailofbits
Trail of Bits
1 year
We are now accepting applicants for our summer internship program! We will be hiring approximately 10-15 interns across our research, engineering, and assurance practices
6
25
102
@trailofbits
Trail of Bits
5 years
Reverse Taint Analysis Using Binary Ninja
Tweet media one
0
64
106
@trailofbits
Trail of Bits
6 years
An accessible overview of Meltdown and Spectre, Part 2
Tweet media one
1
59
103
@trailofbits
Trail of Bits
10 months
Today we're releasing Caracal, our new static analysis tool for Starknet smart contracts. It has 10 detectors that detect reentrancies and other vulnerabilities, two printers, and more!
2
27
102
@trailofbits
Trail of Bits
5 years
Rewriting Functions in Compiled Binaries
Tweet media one
0
49
102
@trailofbits
Trail of Bits
7 years
Breaking Down Binary Ninja’s Low Level IL
Tweet media one
0
68
103
@trailofbits
Trail of Bits
10 months
With Echidna 2.1.0 and later, you can retrieve on-chain data to fuzz deployed contracts and test how new code integrates with existing contracts. You can also use it to recreate real-world hacks!
2
28
102
@trailofbits
Trail of Bits
7 years
Let’s talk about CFI: Microsoft Edition
Tweet media one
2
82
101
@trailofbits
Trail of Bits
6 years
Heavy lifting with McSema 2.0
Tweet media one
0
67
101
@trailofbits
Trail of Bits
7 years
Manticore will soon integrate Symbolic Execution into Binary Ninja! Follow along on the BinjaIL branch here:
1
53
100
@trailofbits
Trail of Bits
7 months
Slither now supports Vyper and includes 5 new detectors, thanks to @vyperlang and @dguido 😉 Foundry UX is also much improved: tests and scripts are now excluded, and Slither can run on single files.
3
22
95
@trailofbits
Trail of Bits
2 years
Intern Francesco Bertolaccini developed rellic-headergen, a utility that creates C declarations from debug information in LLVM bitcode produced by Clang from C, C++, or Objective-C. Now you can easily “C” your data structures!
0
12
96
@trailofbits
Trail of Bits
1 year
Trail of Bits is announcing a new practice focused on machine learning and artificial intelligence! We’re bringing together safety and security to create a new risk assessment and assurance program
3
23
97
@trailofbits
Trail of Bits
7 years
Tracking a stolen code-signing certificate with osquery
Tweet media one
0
67
94
@trailofbits
Trail of Bits
2 months
Triaging static analysis results is now easier with our VSCode extension SARIF explorer.
Tweet media one
2
26
96
@trailofbits
Trail of Bits
1 year
The naive approach to searching for patterns in source code is to use regular expressions, but that has limitations. Our intern prototyped an internal tool that does searching on Clang ASTs to avoid these limitations
3
16
96
@trailofbits
Trail of Bits
2 years
What does your code use, and is it vulnerable? It-depends! Our new tool, It-Depends, can automatically build a dependency graph and software bill of materials (SBOM) for arbitrary code, even C and C++, and alert you to any upstream vulnerabilities.
1
35
94
@trailofbits
Trail of Bits
6 months
We assessed the YOLOv7 vision model and identified 11 security vulnerabilities that could enable RCE, DoS, and model differentials. We do not recommend using the codebase for mission-critical applications or applications that require high availability.
3
30
94
@trailofbits
Trail of Bits
5 years
Binary symbolic execution with KLEE-Native
Tweet media one
0
38
91
@trailofbits
Trail of Bits
6 years
Effortless security feature detection with Winchecksec
Tweet media one
1
57
93
@trailofbits
Trail of Bits
4 years
Accidentally stepping on a DeFi lego: @samczsun helped save ~$400k from a bug in yEarn. 🎉
4
25
86
@trailofbits
Trail of Bits
5 years
McSema now has an open-source Dyninst frontend that compares competitively with IDA Pro. Check out this amazing thesis by Lukáš Korenčik to see how all the parts fit together.
4
41
85
@trailofbits
Trail of Bits
4 years
Real-time file monitoring on Windows with osquery
Tweet media one
1
38
87
@trailofbits
Trail of Bits
1 year
Harnessing the eBPF Verifier
0
25
85
@trailofbits
Trail of Bits
5 months
Struggling with fuzzing a huge blockchain protocol? Fuzzing tip #1 : Start with stateless functions. Pure functions and libraries are your best friends in the early stages of fuzzing. Master the basics before getting complex.
Tweet media one
0
8
84
@trailofbits
Trail of Bits
2 years
Our report is dense and technical, so we summarized its key findings in a 20-minute podcast in plain language. We believe it's crucial that a wider audience understand the risks of blockchain technology. Listen now:
3
19
82
@trailofbits
Trail of Bits
8 years
The Problem with Dynamic Program Analysis
Tweet media one
2
75
84
@trailofbits
Trail of Bits
8 months
Thanks to a generous grant from @vyperlang , we are working to bring full support for #Vyper to Slither and Echidna. Follow along on the PRs here:
@Montyly
Josselin Feist
8 months
But we don't want the echidna to be jealous:
0
2
21
3
16
83