https://github.com/crytic/optik
Optik is a set of symbolic execution tools that assist smart-contract fuzzers
Science Score: 13.0%
This score indicates how likely this project is to be science-related based on various indicators:
-
○CITATION.cff file
-
✓codemeta.json file
Found codemeta.json file -
○.zenodo.json file
-
○DOI references
-
○Academic publication links
-
○Committers with academic emails
-
○Institutional organization owner
-
○JOSS paper metadata
-
○Scientific vocabulary similarity
Low similarity (11.2%) to scientific vocabulary
Keywords
Keywords from Contributors
Repository
Optik is a set of symbolic execution tools that assist smart-contract fuzzers
Basic Info
- Host: GitHub
- Owner: crytic
- License: other
- Language: Python
- Default Branch: master
- Homepage: https://github.com/crytic/optik
- Size: 594 KB
Statistics
- Stars: 94
- Watchers: 6
- Forks: 12
- Open Issues: 28
- Releases: 1
Topics
Metadata Files
README.md
Optik
Optik is a set of symbolic execution tools that assist smart contract fuzzers, letting them run in a hybrid mode. Optik couples Echidna, our smart contract fuzzer, with the Maat symbolic executor that replays the fuzzing corpus and extends it with new inputs that increase coverage.
Current limitations
Optik is a work in progress and should not be used for real audits yet. Current limitations include:
- Symbolic
KECCAKhashes are not supported CREATE2,CALLCODE, andDELEGATECALLare not yet supported- Gas is not taken into account
- Some echidna options are not yet supported (see
hybrid-echidna -h)
Hybrid Echidna
Optik allows to run the Echidna smart-contract fuzzer in hybrid mode. It basically couples Echidna with the Maat symbolic executor that replays the Echidna corpus and extends it with new inputs that increase coverage.
hybrid-echidna starts with several incremental seeding steps, where it seeds the corpus with short transactions sequences obtained by Slither's dataflow analysis, and uses symbolic execution more intensely to solve new inputs. The sequence length is incremented at each seeding step. Once it reaches a certain length threshold, hybrid-echidna falls back into its normal mode, starts to limit the number of symbolic inputs to solve, and stops using dataflow analysis for seeding the corpus.
Usage
Hybrid echidna can be used seamlessly in place of regular Echidna by replacing echidna-test with hybrid-echidna in your Echidna command line.
For example:
hybrid-echidna MyContract.sol --test-mode assertion --corpus-dir /tmp/test --contract MyContract
Additionnal options are available in hybrid mode to control hybrid-echidna's behaviour:
--max-iters: maximum number of fuzzing iterations to perform (one iteration is one Echidna campaign + one symbolic executor run on the corpus)--solver-timeout: maximum time in milliseconds to spend solving each possible new input--incremental-threshold: number of initial incremental seeding steps to perform--no-incremental: skip initial incremental seeding--cov-mode: type of coverage to increase when solving new inputs. Most coverage modes are implemented for experimental purposes. Unless you are developing/hacking on Optik, we recommend to keep the default mode
Debugging, logging and terminal display:
--debug: add debugging information to the log output--logs: write logs to a given file (orstdout)--no-display: disable the graphical terminal display
Installation
For a quick installation, run:
console
python3 -m pip install optik-tools
To keep up with the latest features and fixes, install Optik from its master branch:
console
git clone https://github.com/crytic/optik && cd optik
python3 -m pip install .
You can also run it from Docker:
```console git clone https://github.com/crytic/optik && cd optik docker build -t crytic/optik . docker run -it --rm --mount type=bind,source="$(pwd)",target=/workdir crytic/optik
This runs the Docker container, mounting the local directory into /workdir
```
Owner
- Name: Crytic
- Login: crytic
- Kind: organization
- Email: opensource@trailofbits.com
- Location: New York, NY
- Website: https://www.trailofbits.com/
- Repositories: 66
- Profile: https://github.com/crytic
Blockchain Security, by @trailofbits
GitHub Events
Total
- Watch event: 7
Last Year
- Watch event: 7
Committers
Last synced: 10 months ago
Top Committers
| Name | Commits | |
|---|---|---|
| Boyan MILANOV | b****v@t****m | 79 |
| Tom | 5****m | 9 |
| Feist Josselin | j****t@g****m | 3 |
| Dan Guido | d****n@t****m | 2 |
| alpharush | 0****h@p****m | 1 |
| James Olds | o****j | 1 |
| Evan Sultanik | e****n@s****m | 1 |
Committer Domains (Top 20 + Academic)
Issues and Pull Requests
Last synced: 10 months ago
All Time
- Total issues: 70
- Total pull requests: 73
- Average time to close issues: 9 days
- Average time to close pull requests: about 22 hours
- Total issue authors: 11
- Total pull request authors: 9
- Average comments per issue: 0.61
- Average comments per pull request: 0.25
- Merged pull requests: 67
- Bot issues: 0
- Bot pull requests: 1
Past Year
- Issues: 0
- Pull requests: 1
- Average time to close issues: N/A
- Average time to close pull requests: N/A
- Issue authors: 0
- Pull request authors: 1
- Average comments per issue: 0
- Average comments per pull request: 0.0
- Merged pull requests: 0
- Bot issues: 0
- Bot pull requests: 1
Top Authors
Issue Authors
- Boyan-MILANOV (37)
- ggrieco-tob (5)
- rappie (4)
- 0xalpharush (2)
- SheldonHolmgren (2)
- wuestholz (2)
- Thomas-Malcolm (1)
- woodruffw (1)
- tjade273 (1)
- elopez (1)
- bohendo (1)
Pull Request Authors
- Boyan-MILANOV (29)
- Thomas-Malcolm (9)
- 0xalpharush (4)
- montyly (3)
- dependabot[bot] (2)
- elopez (1)
- ESultanik (1)
- oldsj (1)
- ChmielewskiKamil (1)
Top Labels
Issue Labels
Pull Request Labels
Dependencies
- actions/checkout v2 composite
- actions/setup-python v2 composite
- github/super-linter/slim v4.9.2 composite
- actions/checkout v2 composite
- actions/setup-python v2 composite
- actions/checkout v2 composite
- actions/download-artifact v2 composite
- actions/setup-python v2 composite
- actions/upload-artifact v2 composite
- pypa/gh-action-pypi-publish v1.5.0 composite
- trailofbits/echidna latest build
- crytic-compile *
- eth_abi *
- pymaat >=0.6.7
- pysha3 *
- pyyaml *
- rlp *
- setuptools >=45
- slither-analyzer *
- solc-select *
- wheel *