BlockApex (Auditor) was contracted by Voirstudio (Client) for the purpose of conducting a Smart Contract Audit/Code Review of Unipilot Farming module. This document presents the findings of our analysis which took place on _9th November 2021___ .
Alright, folks! Guess you've learned too much stuff by now, mastered the methods, and are all set to dive a little more deeper. But before we get our hands more nasty, there's a little something we've got to address. This final hurdle is an equal opportunity mischief maker - it doesn't matter whether you're a seasoned developer who types at lightning speed code, or a steadfast security engineer who wards off cyber threats with the finesse of a digital ninja. But just Strap in, wait for the speed bump to hit in, adjust your spectacles, and let's tackle this last challenge on our journey. Onwards and upwards, team!
Understanding how people think, especially in the realm of development and testing, is a complex matter. Coming from a testing background myself, I often ponder how I might have performed had I been a developer. But that's a subjective thought. What's clear, however, is the bias that can creep into auditing or testing. It's not a good sign.
Imagine receiving a lengthy codebase with no testing. It's a disaster waiting to happen. Or perhaps there are tests, but they appear to be mere formalities, lacking substance and rigor. Why would this happen? Let me elucidate.
Consider this perspective: "If I were a developer, I would have crafted something with all my heart, treating it like my own child. Having invested so much effort, how could I possibly leave any bugs or errors in it?" This bias leads to a mindset where, when writing tests, one already assumes everything is working perfectly. The tests become a mere process, a box to tick, rather than a genuine effort to ensure quality. The optimism is lost.
This story isn't unique to developers. It's a tale that resonates with SQA engineers and security engineers alike. The biases, the assumptions, and the complacency can manifest in many forms, but the underlying theme remains the same. The belief that one's work is flawless can lead to a lack of critical evaluation, and that's where the real danger lies. Whether it's development, quality assurance, or security, the challenge is to overcome these biases and approach the task with an open, critical, and unbiased mind.
Let me describe each of them by role!!
Confirmation Bias: Developers may fall into the trap of confirmation bias, where they interpret information in a way that confirms their pre-existing beliefs or hypotheses. For example, they may focus more on testing code written by a colleague or sometimes most of developers google, point is code can have a history of errors, maybe he doesn't know, thereby neglecting other potentially problematic areas.
Congruence Bias: This bias leads developers to validate only the expected behavior, ignoring potential negative or alternative outcomes. This narrow focus can lead to missed defects and vulnerabilities.
Resemblance Bias: SQA professionals may judge a situation based on the resemblance of a similar situation. For instance, they may assume that web applications will have similar kinds of errors, leading to a narrow focus and potentially missing unique or unexpected defects.
In-Attentional Blindness: This bias can cause testers to miss the most obvious defects when they are not specifically looking for them. For example, in an enhancement project, focusing solely on a newly developed feature may lead to overlooking critical integrations elsewhere.
Negativity Bias: This refers to giving more psychological weight to bad experiences than good ones. In testing, this may manifest as an unwillingness to sign off on a software for production, focusing only on uncovered defects and ignoring the overall quality and readiness of the product.
Bandwagon Effect: Security engineers may be influenced by the collective beliefs of their peers. If a group believes that a particular module or system is secure, others may unconsciously adopt the same belief, leading to a lack of scrutiny and potential security risks.
Confirmation Bias: Similar to developers, security engineers may also suffer from confirmation bias, focusing on areas that align with their preconceived notions and neglecting others that may pose significant security threats.
Congruence Bias: Auditors may fall into the trap of focusing on one feature and try to break it and not consider other threats only considering the same threat and failing to explore alternative scenarios. This can lead to a lack of comprehensive evaluation and potential oversights in compliance and risk assessment. This can also happen when they don't have enough time to finish, I guess this is why we should not consider anything 100% secure.
In-Attentional Blindness: Auditors may overlook significant issues if they are not specifically within the scope of their current focus. This can lead to incomplete audits and potential regulatory or compliance failures.
Basically!
Cognitive biases are inherent in human nature and can significantly impact everyone within the software development and testing process.
Point is how to get over this while testing, specifically formal verification. The method is very simple. Try not to be, believe me it will lead to more accurate and reliable outcomes in software development, testing, security, and auditing.
Let's forge ahead and I will explore you with this remarkable technique that promises to be a game-changer for developers and testers alike. It will help you to transcend your biases, it paves the way for a substantial enhancement in code quality. This isn't just a method; it's a revolution, a key to unlock potential. In the ever-evolving landscape of software development, this technique stands as a beacon, guiding professionals to a future where code isn't just written but written with precision. It's time to embrace this new era, where biases are left behind, and quality takes center stage.
it’s not merely a methodology; it's a paradigm shift in the software development lifecycle. By incorporating fuzz testing at the inception of development, FDD fundamentally alters the outcome, transcending conventional methodologies. It provides a solid and unyielding framework for quality assurance and security validation, establishing a new benchmark in the pursuit of excellence and resilience in software engineering.
Now the question is "How can one overcome his bias using FDD?
Objective Evaluation through Randomized Inputs: FDD employs stochastic processes to generate a plethora of test cases, ranging from the mundane to the downright bizarre. It's like throwing a party for your code and inviting guests from every corner of the input space. You never know who might show up, but that's the fun part!
Automated Continuous Testing: Automation in FDD is not just a convenience; it's a relentless pursuit of perfection. It's like having a robotic comedian that never sleeps, continually testing your code's sense of humor with an endless stream of punchlines (or in this case, edge cases).
Security-Centric Approach: FDD's focus on security is akin to a digital bodyguard for your code, always on the lookout for potential threats. It's not paranoid; it's just thorough. After all, in the world of code, trust issues are considered a virtue.
Collaborative Cross-Functional Teams: FDD fosters collaboration between developers, testers, and security experts. It's like a tech symphony where everyone plays a different instrument but follows the same score. The result? Harmonious code that sings rather than stings.
Adaptive Testing Methodologies: FDD is not set in stone; it's more like a jazz improvisation, adapting to the ever-changing rhythm of vulnerabilities and attack vectors. It's about staying one step ahead of the bad guys, even if it means dancing to a different beat.
Fuzz Driven Development is not just a buzzword; it's a hell of a technique, The methodology, or a best practice that helps developers and testers overcome their biases. It's about looking at code not just as lines on a screen but as a living, breathing entity that needs to be challenged, prodded, and occasionally tickled with unexpected inputs.
In the grand show of software development, FDD is the spotlight that shines on the hidden corners, revealing the unseen and making the improbable probable. It's a journey into the unknown, with a roadmap written in algorithms, a compass guided by randomness, and a destination defined by quality.
So, dear readers, embrace the chaos, dance with the unexpected, and let FDD be your guide to become the best. After all, in the world of Fuzz Driven Development, the only constant is surprise, and the only bias is towards excellence.
BlockApex (Auditor) was contracted by Voirstudio (Client) for the purpose of conducting a Smart Contract Audit/Code Review of Unipilot Farming module. This document presents the findings of our analysis which took place on _9th November 2021___ .
Consensus algorithms are undoubtedly a major building block of blockchain technology. By definition, no single party can control the operation of a blockchain network, so consensus algorithms are relied on to achieve a common agreement.
The article "Infiltrating The EVM IV - Echoes of the Past, Visions for Tomorrow" takes readers on a captivating journey through real-life incidents in the realm of blockchain security. Three gripping narratives stand out: the MISO rescue mission, the Dark Forest of Ethereum, and the Siren Market exploit.
The analysis indicates that the contracts audited are secured and follow the best practices.
Our team performed a technique called “Filtered Audit”, where the contract was separately audited by two individuals. After their thorough and rigorous process of manual testing, an automated review was carried out using Slither, and Manticore. All the flags raised were manually reviewed and re-tested.
The Deus DAO hack had significant financial consequences, with users collectively losing around $6.5 million across Arbitrum, BSC, and Ethereum chains. Furthermore, the hack caused the DEI stablecoin to depeg by more than 80%, destabilizing its value and potentially shaking investor confidence.
A major pillar of blockchain technology is transparency. This means that any system built on blockchain is by definition public- a fact that introduces an entirely new set of vulnerabilities and threats. As a result, cleverly orchestrated hacks on blockchain solutions are not an uncommon feat. Even the biggest names in the field continue to suffer from attacks, resulting in losses equating to millions of dollars.
DAOs can be seen as the next step in achieving this vision, eliminating the use of intermediaries in corporate governance. Functioning via an interconnected network of smart contracts, these Decentralized Autonomous Organizations are essentially communities that are fully managed and owned by their members.
War Room is an immersive, high-energy environment incorporating a dedicated team of experts that comes together to form the backbone of the War Room. Read more in this part
This blog explores the fascinating world of fuzz testing methodologies and frameworks. We delve into stateless and stateful fuzzing. Bounded Model Checking (BMC) is introduced as a technique to verify systems against predefined specifications. Additionally, we discuss the essence of End-to-End (E2E) testing, combining structured scenarios with fuzz testing's unpredictability. Lastly, we compare renowned fuzzing tools, Echidna and Foundry, highlighting their unique features and differences.