Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

WIP: Experimental valuegeneration techniques #384

Draft
wants to merge 57 commits into
base: master
Choose a base branch
from
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
57 commits
Select commit Hold shift + click to select a range
b83bc3f
Move CallFrame to utils
Jun 18, 2024
d26cd47
Add ValueGenerationTracer
Jun 18, 2024
0024d74
Import CallFrame from utils for execution_tracer
Jun 18, 2024
385b6fb
Initialize ValueGenerationTracer in fuzzer_worker.go
Jun 18, 2024
af12408
Add a unit test for ValueGenerationTracer
Jun 18, 2024
faf0952
Enable ValueGenerationTracer in configs
Jun 18, 2024
937a7ad
Enable ValueGenerationTracer in medusa.json
Jun 18, 2024
39f7d8e
Modify existing contract to fit our test case
Jun 18, 2024
20ef5ce
Add necessary functions to get event values
Jun 18, 2024
63cf261
Add captureEnteredCallFrame in CaptureEnter
Jun 18, 2024
c60029f
grab events
anishnaik Jun 18, 2024
1695d01
make generating events a ValueGenerationTrace capability
anishnaik Jun 18, 2024
cdab504
Change emitted event values to check for changes in valueSet
s4nsec Jun 21, 2024
92b7699
Store captured event values and their types in a data structure and a…
s4nsec Jun 21, 2024
9118e21
Remove SetValueSet function
s4nsec Jun 24, 2024
6c6bdd2
Modify assert_immediate.sol to check return value collection function…
s4nsec Jun 24, 2024
aeabcdd
Modify fuzzer configs to make debugging easier
s4nsec Jun 24, 2024
f23d608
Remove deprecated storage alternatives for event values
s4nsec Jun 24, 2024
7f56635
Provide a new structure to store both event and return values
s4nsec Jun 24, 2024
0b2f9e6
Get return value of the current call frame
s4nsec Jun 24, 2024
7d1febf
Call getCallFrameReturnValue from captureExitedCallFrame
s4nsec Jun 24, 2024
fc21f10
Provide collected event and return values to MessageResults
s4nsec Jun 24, 2024
492e4c4
Write colleced transaction output values(return, event data) to curre…
s4nsec Jun 24, 2024
0cf6a86
Use AddTransactionOutputValuesToValueSet in fuzzer worker
s4nsec Jun 24, 2024
395667e
Rename ValueGenerationTracingEnabled parameter to ExperimentalValueGe…
s4nsec Jun 27, 2024
01c1de3
Modify the logic to preserve base value set
s4nsec Jun 27, 2024
ba1c045
Set TransactionOutputValues to []any
s4nsec Jun 27, 2024
aeef268
Perform modifications on ValueGenerationTracer methods to adapt to ne…
s4nsec Jun 27, 2024
be7c5b1
Emit and return values of various types
s4nsec Jun 27, 2024
f8874e7
Add a test to check if base value set is preserved throughout the fuz…
s4nsec Jun 27, 2024
233630d
Move ExperimantalValueGenerationEnabled to TestingConfig
s4nsec Jul 1, 2024
5c55b7f
Fix overwriting return values with event values issue
s4nsec Jul 1, 2024
84dd114
Use eventOrReturnValue as variable name to avoid ambiguity
s4nsec Jul 1, 2024
cb7d04f
Grab only if ReturnError is nil
s4nsec Jul 1, 2024
b1c3d0f
Don't expect values when it is contract creation
s4nsec Jul 1, 2024
93799c0
Move ExperimentalValueGenerationEnabled to TestingConfig
s4nsec Jul 17, 2024
ab6d871
Remove type TransactionOutputValues
s4nsec Jul 17, 2024
f2019f5
Add comment descriptions to ValueGenerationTracer members
s4nsec Jul 17, 2024
072c8cb
Remove stale comments and print statements
s4nsec Jul 17, 2024
d8cce90
Prevent return values from being reset
s4nsec Jul 17, 2024
5e10173
Make adding transaction output values value_set.go's responsibility
s4nsec Jul 17, 2024
b496c43
Use Add instead of deprecated AddTransactionOutputValuesToValueSet
s4nsec Jul 17, 2024
f9dd9a0
Use fw.fuzzer.config.Fuzzing.Testing.ExperimentalValueGenerationEnabled
s4nsec Jul 17, 2024
00e8edb
Check whether all values are added and if the base value set is prese…
s4nsec Jul 17, 2024
826aa8f
Reset assert_immediate.sol to default
s4nsec Jul 17, 2024
288337e
Add a contract to test event and return value collection
s4nsec Jul 17, 2024
30f9419
Add to value set inside the unit test
s4nsec Jul 22, 2024
a68363c
Merge remote-tracking branch 'origin/master' into valuegeneration-tracer
s4nsec Jul 23, 2024
0e1763f
Adapt value generation tracer to interface changes
s4nsec Jul 23, 2024
8ac6695
Add new mutation strategy - callSeqGenFuncDuplicateAtRandom
s4nsec Jul 30, 2024
2851e96
code cleanup
anishnaik Jul 30, 2024
14f677b
fix test contract
anishnaik Jul 30, 2024
64e3ca2
wipe value set before test
anishnaik Jul 31, 2024
e94a668
Add expected values to test whether those values are added to the val…
s4nsec Jul 31, 2024
42ab8d3
Merge branch 'master' into valuegeneration-tracer
anishnaik Aug 1, 2024
f12eb1f
Enable JSON coverage reports for valuegeneration tracer benchmarking …
anishnaik Aug 1, 2024
5e2c637
Add latest medusa config
s4nsec Aug 7, 2024
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 0 additions & 1 deletion .github/workflows/ci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -87,7 +87,6 @@ jobs:
inputs: ./medusa-*.tar.gz

- name: Upload artifact
if: github.ref == 'refs/heads/master' || (github.event_name == 'push' && startsWith(github.ref, 'refs/tags/'))
uses: actions/upload-artifact@v4
with:
name: medusa-${{ runner.os }}-${{ runner.arch }}
Expand Down
104 changes: 104 additions & 0 deletions DEV.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,104 @@
# Debugging and Development

## Debugging

The following scripts are available for Medusa developers for debugging changes to the fuzzer.

### Corpus diff

The corpus diff script is used to compare two corpora and identify the methods that are present in one but not the other. This is useful for identifying methods that are missing from a corpus that should be present.

```shell
python3 scripts/corpus_diff.py corpus1 corpus2
```

```shell
Methods only in ~/corpus1:
- clampSplitWeight(uint32,uint32)

Methods only in ~/corpus2:
<None>
```

### Corpus stats

The corpus stats script is used to generate statistics about a corpus. This includes the number of sequences, the average length of sequences, and the frequency of methods called.

```shell
python3 scripts/corpus_stats.py corpus
```

```shell
Number of Sequences in ~/corpus: 130

Average Length of Transactions List: 43

Frequency of Methods Called:
- testReceiversReceivedSplit(uint8): 280
- setMaxEndHints(uint32,uint32): 174
- setStreamBalanceWithdrawAll(uint8): 139
- giveClampedAmount(uint8,uint8,uint128): 136
- receiveStreamsSplitAndCollectToSelf(uint8): 133
- testSqueezeViewVsActual(uint8,uint8): 128
- testSqueeze(uint8,uint8): 128
- testSetStreamBalance(uint8,int128): 128
- addStreamWithClamping(uint8,uint8,uint160,uint32,uint32,int128): 125
- removeAllSplits(uint8): 118
- testSplittableAfterSplit(uint8): 113
- testSqueezableVsReceived(uint8): 111
- testBalanceAtInFuture(uint8,uint8,uint160): 108
- testRemoveStreamShouldNotRevert(uint8,uint256): 103
- invariantWithdrawAllTokensShouldNotRevert(): 103
- collect(uint8,uint8): 101
- invariantAmtPerSecVsMinAmtPerSec(uint8,uint256): 98
- testSqueezableAmountCantBeWithdrawn(uint8,uint8): 97
- split(uint8): 97
- invariantWithdrawAllTokens(): 95
- testReceiveStreams(uint8,uint32): 93
- invariantAccountingVsTokenBalance(): 92
- testSqueezeWithFuzzedHistoryShouldNotRevert(uint8,uint8,uint256,bytes32): 91
- testSqueezableAmountCantBeUndone(uint8,uint8,uint160,uint32,uint32,int128): 87
- testCollect(uint8,uint8): 86
- testSetStreamBalanceWithdrawAllShouldNotRevert(uint8): 86
- testAddStreamShouldNotRevert(uint8,uint8,uint160,uint32,uint32,int128): 85
- testReceiveStreamsShouldNotRevert(uint8): 84
- addSplitsReceiver(uint8,uint8,uint32): 84
- setStreamBalanceWithClamping(uint8,int128): 82
- addSplitsReceiverWithClamping(uint8,uint8,uint32): 80
- testSetStreamBalanceShouldNotRevert(uint8,int128): 80
- testSplitShouldNotRevert(uint8): 80
- squeezeAllAndReceiveAndSplitAndCollectToSelf(uint8): 79
- addStreamImmediatelySqueezable(uint8,uint8,uint160): 79
- testSetSplitsShouldNotRevert(uint8,uint8,uint32): 78
- invariantSumAmtDeltaIsZero(uint8): 78
- testReceiveStreamsViewConsistency(uint8,uint32): 76
- squeezeToSelf(uint8): 74
- collectToSelf(uint8): 72
- setStreams(uint8,uint8,uint160,uint32,uint32,int128): 70
- receiveStreamsAllCycles(uint8): 69
- invariantWithdrawShouldAlwaysFail(uint256): 68
- addStream(uint8,uint8,uint160,uint32,uint32,int128): 68
- squeezeWithFuzzedHistory(uint8,uint8,uint256,bytes32): 67
- setStreamsWithClamping(uint8,uint8,uint160,uint32,uint32,int128): 67
- splitAndCollectToSelf(uint8): 67
- testSqueezeWithFullyHashedHistory(uint8,uint8): 65
- give(uint8,uint8,uint128): 65
- setSplits(uint8,uint8,uint32): 65
- testSqueezeTwice(uint8,uint8,uint256,bytes32): 65
- testSetStreamsShouldNotRevert(uint8,uint8,uint160,uint32,uint32,int128): 64
- squeezeAllSenders(uint8): 63
- removeStream(uint8,uint256): 62
- testCollectableAfterSplit(uint8): 58
- testCollectShouldNotRevert(uint8,uint8): 56
- testReceiveStreamsViewVsActual(uint8,uint32): 55
- receiveStreams(uint8,uint32): 55
- setSplitsWithClamping(uint8,uint8,uint32): 55
- testGiveShouldNotRevert(uint8,uint8,uint128): 47
- setStreamBalance(uint8,int128): 47
- squeezeWithDefaultHistory(uint8,uint8): 45
- testSplitViewVsActual(uint8): 45
- testAddSplitsShouldNotRevert(uint8,uint8,uint32): 30
- testSqueezeWithDefaultHistoryShouldNotRevert(uint8,uint8): 23

Number of Unique Methods: 65
```
1 change: 1 addition & 0 deletions docs/src/static/medusa.json
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@
"callSequenceLength": 100,
"corpusDirectory": "",
"coverageEnabled": true,
"experimentalValueGenerationEnabled": true,
"targetContracts": [],
"targetContractsBalances": [],
"constructorArgs": {},
Expand Down
12 changes: 12 additions & 0 deletions fuzzing/config/config.go
Original file line number Diff line number Diff line change
Expand Up @@ -60,6 +60,14 @@ type FuzzingConfig struct {
// CoverageEnabled describes whether to use coverage-guided fuzzing
CoverageEnabled bool `json:"coverageEnabled"`

// HtmlReportFile describes the name for the html coverage file. If empty,
// the html coverage file will not be saved
HtmlReportFile string `json:"htmlReportPath"`

// JsonReportFile describes the name for the html coverage file. If empty,
// the json coverage file will not be saved
JsonReportFile string `json:"jsonReportPath"`

// TargetContracts are the target contracts for fuzz testing
TargetContracts []string `json:"targetContracts"`

Expand Down Expand Up @@ -142,6 +150,10 @@ type TestingConfig struct {
// OptimizationTesting describes the configuration used for optimization testing.
OptimizationTesting OptimizationTestingConfig `json:"optimizationTesting"`

// ExperimentalValueGenerationEnabled describes the configuration used for testing of collection
// and addition of interesting values found during EVM execution to base value set
ExperimentalValueGenerationEnabled bool `json:"experimentalValueGenerationEnabled"`

// TargetFunctionSignatures is a list function signatures call the fuzzer should exclusively target by omitting calls to other signatures.
// The signatures should specify the contract name and signature in the ABI format like `Contract.func(uint256,bytes32)`.
TargetFunctionSignatures []string `json:"targetFunctionSignatures"`
Expand Down
3 changes: 3 additions & 0 deletions fuzzing/config/config_defaults.go
Original file line number Diff line number Diff line change
Expand Up @@ -46,6 +46,8 @@ func GetDefaultProjectConfig(platform string) (*ProjectConfig, error) {
ConstructorArgs: map[string]map[string]any{},
CorpusDirectory: "",
CoverageEnabled: true,
HtmlReportFile: "coverage_report.html",
JsonReportFile: "coverage_report.json",
SenderAddresses: []string{
"0x10000",
"0x20000",
Expand All @@ -64,6 +66,7 @@ func GetDefaultProjectConfig(platform string) (*ProjectConfig, error) {
TraceAll: false,
TargetFunctionSignatures: []string{},
ExcludeFunctionSignatures: []string{},
ExperimentalValueGenerationEnabled: false,
AssertionTesting: AssertionTestingConfig{
Enabled: true,
TestViewMethods: false,
Expand Down
12 changes: 12 additions & 0 deletions fuzzing/config/gen_fuzzing_config.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

97 changes: 89 additions & 8 deletions fuzzing/coverage/report_generation.go
Original file line number Diff line number Diff line change
Expand Up @@ -3,41 +3,122 @@ package coverage
import (
_ "embed"
"fmt"
"github.com/crytic/medusa/compilation/types"
"github.com/crytic/medusa/utils"
"html/template"
"math"
"os"
"path/filepath"
"strconv"
"time"

"github.com/crytic/medusa/compilation/types"
"github.com/crytic/medusa/utils"
)

var (
//go:embed report_template.gohtml
htmlReportTemplate []byte
//go:embed report_template.gojson
jsonReportTemplate []byte
)

// GenerateReport takes a set of CoverageMaps and compilations, and produces a coverage report using them, detailing
// all source mapped ranges of the source files which were covered or not.
// Returns an error if one occurred.
func GenerateReport(compilations []types.Compilation, coverageMaps *CoverageMaps, htmlReportPath string) error {
func GenerateReport(compilations []types.Compilation, coverageMaps *CoverageMaps, corpusPath string, htmlReportPath string, jsonReportPath string) error {
// Perform source analysis.
sourceAnalysis, err := AnalyzeSourceCoverage(compilations, coverageMaps)
if err != nil {
return err
}

// Finally, export the report data we analyzed.
// Stores the output path of the report
var outputPath string

// Export the html report of the data we analyzed.
if htmlReportPath != "" {
err = exportCoverageReport(sourceAnalysis, htmlReportPath)
outputPath = filepath.Join(corpusPath, htmlReportPath)
err = exportHtmlCoverageReport(sourceAnalysis, outputPath)
}
// Export the json report of the data we analyzed.
if jsonReportPath != "" {
outputPath = filepath.Join(corpusPath, jsonReportPath)
err2 := exportJsonCoverageReport(sourceAnalysis, outputPath)
if err == nil && err2 != nil {
err = err2
}
}
return err
}

// exportCoverageReportJSON takes a previously performed source analysis and generates a JSON coverage report from it.
// Returns an error if one occurs.
func exportJsonCoverageReport(sourceAnalysis *SourceAnalysis, outputPath string) error {
functionMap := template.FuncMap{
"add": func(x int, y int) int {
return x + y
},
"sub": func(x int, y int) int {
return x - y
},
"relativePath": func(path string) string {
// Obtain a path relative to our current working directory.
// If we encounter an error, return the original path.
cwd, err := os.Getwd()
if err != nil {
return path
}
relativePath, err := filepath.Rel(cwd, path)
if err != nil {
return path
}

return relativePath
},
"lastActiveIndex": func(sourceFileAnalysis *SourceFileAnalysis) int {
// Determine the last active line index and return it
lastIndex := 0
for lineIndex, line := range sourceFileAnalysis.Lines {
if line.IsActive {
lastIndex = lineIndex
}
}
return lastIndex
},
}

// Parse our JSON template
tmpl, err := template.New("coverage_report.json").Funcs(functionMap).Parse(string(jsonReportTemplate))
if err != nil {
return fmt.Errorf("could not export report, failed to parse report template: %v", err)
}

// If the parent directory doesn't exist, create it.
parentDirectory := filepath.Dir(outputPath)
err = utils.MakeDirectory(parentDirectory)
if err != nil {
return err
}

// Create our report file
file, err := os.Create(outputPath)
if err != nil {
_ = file.Close()
return fmt.Errorf("could not export report, failed to open file for writing: %v", err)
}

// Execute the template and write it back to file.
err = tmpl.Execute(file, sourceAnalysis)
fileCloseErr := file.Close()
if err == nil {
err = fileCloseErr
}

return err
}

// exportCoverageReport takes a previously performed source analysis and generates an HTML coverage report from it.
// Returns an error if one occurs.
func exportCoverageReport(sourceAnalysis *SourceAnalysis, outputPath string) error {
func exportHtmlCoverageReport(sourceAnalysis *SourceAnalysis, outputPath string) error {
// Define mappings onto some useful variables/functions.
functionMap := template.FuncMap{
"timeNow": time.Now,
Expand All @@ -62,9 +143,9 @@ func exportCoverageReport(sourceAnalysis *SourceAnalysis, outputPath string) err
// Determine our precision string
formatStr := "%." + strconv.Itoa(decimals) + "f"

// If no lines are active and none are covered, show 0% coverage
// If no lines are active and none are covered, show 100% coverage
if x == 0 && y == 0 {
return fmt.Sprintf(formatStr, float64(0))
return fmt.Sprintf(formatStr, float64(100))
}
return fmt.Sprintf(formatStr, (float64(x)/float64(y))*100)
},
Expand Down
15 changes: 15 additions & 0 deletions fuzzing/coverage/report_template.gojson
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
[{{range $index, $sourceFile := .SortedFiles}}{{if $index}},{{end}}
{
"lines": {
"found": {{$sourceFile.ActiveLineCount}},
"hit": {{$sourceFile.CoveredLineCount}},
"details": [{{$lastActive := lastActiveIndex $sourceFile}}{{range $lineIndex, $line := $sourceFile.Lines}}{{if $line.IsActive}}
{
"line": {{add $lineIndex 1}},
"hit": {{if or $line.IsCovered $line.IsCoveredReverted}} 1 {{else}} 0 {{end}}
}{{if ne $lineIndex $lastActive}},{{end}}{{end}}{{end}}
]
},
"file": "{{relativePath $sourceFile.Path}}"
}{{end}}
]
2 changes: 1 addition & 1 deletion fuzzing/executiontracer/execution_tracer.go
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
package executiontracer

import (
"github.com/crytic/medusa/utils"
"math/big"

"github.com/crytic/medusa/chain"
"github.com/crytic/medusa/fuzzing/contracts"
"github.com/crytic/medusa/utils"
"github.com/ethereum/go-ethereum/common"
"github.com/ethereum/go-ethereum/core"
"github.com/ethereum/go-ethereum/core/state"
Expand Down
Loading
Loading