Try   HackMD

Hello everyone! Here’s my development update for Week 13 & 14 of Ethereum Protocol Fellowship Cohort 4!

Here's my progress for the week:

First of all, I'm happy to announce that the security vulnerability I found has been validated by the ethereum bug bounty program and is already fixed!
However, I'm going to avoid giving any details as it's still new at the moment.

I've also been accepted as an official fellow for the EPF! Many thanks to Mario Havel and JoshD!

I've been doing a lot of research and testing on a potential new security vulnerability, again I can't talk too much about it but I've had a few leads so far that haven't worked out and I've decided to put them aside for the time being because I've spent a lot of time on them.

I've also corrected a weird error on my setup due to a manipulation in the tests for the new potential security vulnerability that took me 1.5 days to fix :( The error isn't 100% corrected yet but i can work again so I've put it aside.

Then I added a new message to the project.

I wanted to add a new fuzzer before adding new messages and I thought that rather than making one from scratch it would be interesting to start integrating existing fuzzers because for the moment the fuzzers present are only fuzzers that I've written myself and not taking advantage of existing fuzzers that are reputable and have been maintained for a long time.

So I thought about how I could integrate these fuzzers and did some research to see which would be the most interesting.
I decided to start by integrating BooFuzz.
So I wrote some python scripts that allow BooFuzz to generate fuzzed inputs for the messages in my project.

Next Steps

  • Finish writing the python scripts for BooFuzz.

  • Integrate BooFuzz into the project

  • Add new messages and fuzzers to the project

  • Update the documentation

  • Continue research and testing on the new potential security vulnerability