Bytecode-level Concolic execution engine for Solana smart contracts, enabling program analysis through symbolic and concrete execution
Radiant combines concrete and symbolic execution to systematically explore program paths in Solana smart contracts, enabling security validation tailored to your protocol's architecture.
Leverages constraint solving to discover edge cases and reveal hidden vulnerabilities in your smart contracts.
Smart contracts operate in adversarial environments where traditional testing methods struggle to uncover edge cases that only manifest under specific state conditions. Manual testing and conventional fuzzing can't systematically explore all possible execution paths, leaving critical vulnerabilities hidden until they're exploited in production.
Radiant solves this through concolic execution, combining concrete and symbolic execution to enable enhanced program path exploration. By symbolizing instruction parameters and account fields, solving constraints and generate concrete test inputs, Radiant discovers edge cases and validates invariants across the execution space of your protocol.
A systematic approach to concolic execution
Create a testcase with selected accounts, transactions and desired blockchain state
Symbolize specific instruction parameters or account fields for desired instructions
Deploy pipeline to triage symbolized fields to find concrete values
Found solutions to contraints can be assessed to build enhanced validation capabilities
Exploration of all execution paths derived from symbolic values.
Validates protocol invariants and security properties across diverse execution scenarios.
Augmented test suites tailored to your contract's logic.
Identifies boundary conditions and corner cases that traditional fuzzing can miss.
Analyzes cross-program invocations to discover vulnerabilities spanning multiple programs and complex interaction patterns.
Optimizes exploration by merging equivalent execution states, reducing path explosion and improving analysis performance for complex programs.
Invariant analysis and edge case discovery before contract deployment
Automated test suite generation ensuring contract updates don't introduce new issues
Verification of security invariants and protocol-specific correctness properties
Concolic testing methodology tailored to your protocol's architecture