Trail of Bits

@trailofbits@infosec.exchange
1.4K Followers
5 Following
306 Posts
We help secure the world’s most targeted organizations and products. We combine security research with an attacker mentality to reduce risk and fortify code.
Websitehttps://trailofbits.com
Podcasthttps://trailofbits.audio
GitHubhttps://github.com/trailofbits
Bloghttps://blog.trailofbits.com

DARPA's AI Cyber Challenge finals are underway. Seven autonomous AI systems are competing to find and patch vulnerabilities in critical open-source programs like the Linux kernel, SQLite, and cURL that power our digital infrastructure.

Learn more: https://blog.trailofbits.com/2025/07/02/buckle-up-buttercup-aixccs-scored-round-is-underway/

We’re sponsoring REcon this weekend with a team of security engineers attending. See you there! https://www.recon.cx/

Did you know the biggest cause of crypto hacks in 2024 goes entirely unnoticed by most security audits? This attack vector was responsible for 43% of the crypto stolen in 2024, and isn't eligible as a finding in audit contests or most audit engagements

Answer: Private key compromise.

In this post, you'll learn how to make protocols resilient to private key leaks using our 4-level framework: https://blog.trailofbits.com/2025/06/25/maturing-your-smart-contracts-beyond-private-key-risk/

Our new Testing Handbook section on snapshot fuzzing helps security engineers test software that's traditionally difficult to analyze, such as kernel components and antivirus, where a single crash can take down the entire system.

Snapshot fuzzing captures memory and register states at critical execution points, allowing security engineers to:

- Test thousands of code paths without time-consuming system restarts
- Ensure fully deterministic testing where the same input always produces the same result
- Eliminate unreproducible crashes by starting each test from identical states
-Easily track code coverage and detect failures in emulated environments

In this section, we provide step-by-step instructions for building custom harnesses, fuzz campaigns, and more using What the Fuzz (wtf), an open-source snapshot-based fuzzer.

https://blog.trailofbits.com/2025/04/09/introducing-a-new-section-on-snapshot-fuzzing-for-kernel-level-testing-in-the-testing-handbook/

Introducing a new section on snapshot fuzzing for kernel-level testing in the Testing Handbook

Snapshot Fuzzing enables security engineers to effectively test software that is traditionally difficult to analyze, such as kernel-level software (though the technique is not limited to such software). Whether you’re auditing drivers or other kernel-mode components, including antivirus software, snapshot fuzzing provides a robust way to discover critical vulnerabilities. Consult our new Testing Handbook section for a walkthrough on how to conduct snapshot fuzzing on your system.

The Trail of Bits Blog

Just as you regularly update your computer's software, you should also regularly update your threat model.

Read our blog: https://blog.trailofbits.com/2025/03/03/continuous-trail/

Continuous TRAIL

You and your team should incrementally update your threat model as your system changes, integrating threat modeling into each phase of your SDLC to create a Threat and Risk Analysis Informed Lifecycle (TRAIL). Here, we cover how to do that: how to further tailor the threat model we built, how to maintain it, when to update it as development continues, and how to make use of it.

The Trail of Bits Blog

Invariant Driven development is the future of smart contracts development.

Read more here: https://hubs.la/Q036nQM40

The call for invariant-driven development

By Josselin Feist Writing smart contracts requires a higher level of security assurance than most other fields of software engineering. The industry has evolved from simple ERC20 tokens to complex,…

Trail of Bits Blog
We've been named among BuiltIn's 100 Best Remote Midsize Places to Work for our commitment to remarkable talent. Full health coverage, 4 months parental leave, and industry-leading compensation are just a few ways we reflect our investment in engineering excellence.https://builtin.com/awards/remote/2025/best-midsize-places-to-work#trail-of-bits
100 Best Midsize Remote Companies to Work for 2025 | Built In

Built In’s Best Midsize Remote Companies to Work for list algorithmically ranks midsize fully remote tech companies with the best employee benefits and salary in 2025.

Read our Fall Tribune: We uncovered security pitfalls in AWS Nitro Enclaves, published our audit of Hugging Face's Gradio library, and expanded our Testing Handbook with cryptographic testing guidance.
https://hubs.la/Q02YG6xQ0
500: We've Run Into An Issue | Mailchimp

In this week's @riskybusiness episode, @dguido talks about all things post-quantum cryptography:
• Quantum computer timeline
• PQC implementation challenges
• Hybrid encryption solutions
• Device lifespan considerations
https://risky.biz/RBNEWSSI62/

A few of our fav PQC resources:
https://blog.trailofbits.com/2024/08/15/we-wrote-the-code-and-the-code-won/
https://blog.trailofbits.com/2024/07/01/quantum-is-unimportant-to-post-quantum/
https://blog.trailofbits.com/2024/08/21/yolo-is-not-a-valid-hash-construction/
https://blog.trailofbits.com/category/cryptography/

Sponsored: Trail of Bits on post-quantum cryptography - Risky Business

Sponsored: Trail of Bits on post-quantum cryptography

We're excited to announce a new partnership with Semgrep to promote secure-by-design practices in application security. This collaboration will accelerate the delivery of advanced Semgrep features to our clients, enhancing vulnerability detection and mitigation. https://blog.trailofbits.com/2024/09/19/announcing-the-trail-of-bits-and-semgrep-partnership/
Announcing the Trail of Bits and Semgrep partnership

At Trail of Bits, we aim to share and develop tools and resources used in our security assessments with the broader security community. Many clients, we observed, don’t use Semgrep to its ful…

Trail of Bits Blog