Radiant

Bytecode-level Concolic execution engine for Solana smart contracts, enabling program analysis through symbolic and concrete execution

Overview

Radiant combines concrete and symbolic execution to systematically explore program paths in Solana smart contracts, enabling security validation tailored to your protocol's architecture.

Leverages constraint solving to discover edge cases and reveal hidden vulnerabilities in your smart contracts.

Radiant Architecture
Radiant Workflow

Why Radiant?

Smart contracts operate in adversarial environments where traditional testing methods struggle to uncover edge cases that only manifest under specific state conditions. Manual testing and conventional fuzzing can't systematically explore all possible execution paths, leaving critical vulnerabilities hidden until they're exploited in production.

Radiant solves this through concolic execution, combining concrete and symbolic execution to enable enhanced program path exploration. By symbolizing instruction parameters and account fields, solving constraints and generate concrete test inputs, Radiant discovers edge cases and validates invariants across the execution space of your protocol.

How It Works

01

Test Creation

Create a testcase with selected accounts, transactions and desired blockchain state

02

Symbolize

Symbolize specific instruction parameters or account fields for desired instructions

03

Deploy

Deploy pipeline to triage symbolized fields to find concrete values

04

Report

Found solutions to contraints can be assessed to build enhanced validation capabilities

Key Features

Symbolic Execution

Exploration of all execution paths derived from symbolic values.

Invariant Testing

Validates protocol invariants and security properties across diverse execution scenarios.

Custom Test Suites

Augmented test suites tailored to your contract's logic.

Edge Case Discovery

Identifies boundary conditions and corner cases that traditional fuzzing can miss.

Closed and Open Source Program Support

Analyze programs with or without source code through bytecode-level symbolic execution.

CI/CD Integration

Derived solutions can be ingested into continuous testing pipelines for ongoing security validation.

Use Cases

Pre-Deployment Testing

Invariant analysis and edge case discovery before contract deployment

Regression Testing

Automated test suite generation ensuring contract updates don't introduce new issues

Protocol Validation

Formal verification of security invariants and protocol-specific correctness properties

Validate Your Smart Contracts

Concolic testing methodology tailored to your protocol's architecture

Request Access View All Products