Protocol Berg v2

The Art of Manually Guided Fuzzing
2025-06-13 , 9 - Workshop

Manually Guided Fuzzing represents a paradigm shift in smart contract security testing, combining the precision of white-box approaches with the efficiency of targeted test flows. Unlike traditional fuzzing techniques that rely on randomness or predefined properties, this innovative approach empowers developers and auditors to direct the fuzzing process toward potential vulnerabilities with surgical precision, drastically improving both testing efficiency and vulnerability detection in complex DeFi systems.


Traditional fuzzing techniques like black box and property-based fuzzing often fall short when testing complex smart contracts, leaving critical vulnerabilities undiscovered. In this interactive workshop, participants will learn how to implement Manually Guided Fuzzing — a powerful technique that combines white box knowledge with structured testing flows for more efficient vulnerability detection. Using the Wake Framework, attendees will gain hands-on experience creating targeted fuzzing campaigns that focus on potential attack vectors rather than relying on brute force approaches. By the end of this workshop, participants will have practical skills to implement guided fuzzing in their own security workflows, dramatically improving testing efficiency and vulnerability discovery rates for complex DeFi protocols and integrated smart contracts. Through real-world examples of vulnerabilities caught by this technique but missed by conventional methods, participants will understand why Manually Guided Fuzzing represents a critical evolution in smart contract security testing, placing the power back in the hands of security researchers while providing them with more precise and effective testing tools.

See also: Manually Guided Fuzzing Blog Post

Ethereum security researcher at Ackee Blockchain Security. Ethereum tooling developer.

Michal is a contributor to the Ethereum Yellow Paper and a graduate of Computer Security at CTU Prague. He works on open-source security tooling for Solidity development, including fuzzing and static analysis. Michal is an auditor with a track record of critical on-chain vulnerabilities detected.