foundry_config/fuzz.rs
1//! Configuration for fuzz testing.
2
3use alloy_primitives::U256;
4use foundry_compilers::utils::canonicalized;
5use serde::{Deserialize, Serialize};
6use std::path::PathBuf;
7
8/// Contains for fuzz testing
9#[derive(Clone, Debug, PartialEq, Eq, Serialize, Deserialize)]
10pub struct FuzzConfig {
11 /// The number of test cases that must execute for each property test
12 pub runs: u32,
13 /// Optional 1-based fuzz run to execute.
14 pub run: Option<u32>,
15 /// Optional fuzz worker ID to pair with `run`.
16 pub worker: Option<u32>,
17 /// Fails the fuzzed test if a revert occurs.
18 pub fail_on_revert: bool,
19 /// The maximum number of test case rejections allowed,
20 /// encountered during usage of `vm.assume` cheatcode.
21 pub max_test_rejects: u32,
22 /// Optional seed for the fuzzing RNG algorithm
23 pub seed: Option<U256>,
24 /// The fuzz dictionary configuration
25 #[serde(flatten)]
26 pub dictionary: FuzzDictionaryConfig,
27 /// Number of runs to execute and include in the gas report.
28 pub gas_report_samples: u32,
29 /// The fuzz corpus configuration.
30 #[serde(flatten)]
31 pub corpus: FuzzCorpusConfig,
32 /// Path where fuzz failures are recorded and replayed.
33 pub failure_persist_dir: Option<PathBuf>,
34 /// show `console.log` in fuzz test, defaults to `false`
35 pub show_logs: bool,
36 /// Optional timeout (in seconds) for each property test
37 pub timeout: Option<u32>,
38}
39
40impl Default for FuzzConfig {
41 fn default() -> Self {
42 Self {
43 runs: 256,
44 run: None,
45 worker: None,
46 fail_on_revert: true,
47 max_test_rejects: 65536,
48 seed: None,
49 dictionary: FuzzDictionaryConfig::default(),
50 gas_report_samples: 256,
51 corpus: FuzzCorpusConfig::default(),
52 failure_persist_dir: None,
53 show_logs: false,
54 timeout: None,
55 }
56 }
57}
58
59impl FuzzConfig {
60 /// Creates fuzz configuration to write failures in `{PROJECT_ROOT}/cache/fuzz` dir.
61 pub fn new(cache_dir: PathBuf) -> Self {
62 Self { failure_persist_dir: Some(cache_dir), ..Default::default() }
63 }
64}
65
66/// Contains for fuzz testing
67#[derive(Clone, Copy, Debug, PartialEq, Eq, Serialize, Deserialize)]
68pub struct FuzzDictionaryConfig {
69 /// The weight of the dictionary
70 #[serde(deserialize_with = "crate::deserialize_stringified_percent")]
71 pub dictionary_weight: u32,
72 /// The flag indicating whether to include values from storage
73 pub include_storage: bool,
74 /// The flag indicating whether to include push bytes values
75 pub include_push_bytes: bool,
76 /// How many addresses to record at most.
77 /// Once the fuzzer exceeds this limit, it will start evicting random entries
78 ///
79 /// This limit is put in place to prevent memory blowup.
80 #[serde(
81 deserialize_with = "crate::deserialize_usize_or_max",
82 serialize_with = "crate::serialize_usize_or_max"
83 )]
84 pub max_fuzz_dictionary_addresses: usize,
85 /// How many values to record at most.
86 /// Once the fuzzer exceeds this limit, it will start evicting random entries
87 #[serde(
88 deserialize_with = "crate::deserialize_usize_or_max",
89 serialize_with = "crate::serialize_usize_or_max"
90 )]
91 pub max_fuzz_dictionary_values: usize,
92 /// How many literal values to seed from the AST, at most.
93 ///
94 /// This value is independent from the max amount of addresses and values.
95 #[serde(
96 deserialize_with = "crate::deserialize_usize_or_max",
97 serialize_with = "crate::serialize_usize_or_max"
98 )]
99 pub max_fuzz_dictionary_literals: usize,
100}
101
102impl Default for FuzzDictionaryConfig {
103 fn default() -> Self {
104 const MB: usize = 1024 * 1024;
105
106 Self {
107 dictionary_weight: 40,
108 include_storage: true,
109 include_push_bytes: true,
110 max_fuzz_dictionary_addresses: 300 * MB / 20,
111 max_fuzz_dictionary_values: 300 * MB / 32,
112 max_fuzz_dictionary_literals: 200 * MB / 32,
113 }
114 }
115}
116
117#[derive(Clone, Debug, PartialEq, Eq, Serialize, Deserialize)]
118pub struct FuzzCorpusConfig {
119 // Path to corpus directory, enabled coverage guided fuzzing mode.
120 // If not set then sequences producing new coverage are not persisted and mutated.
121 pub corpus_dir: Option<PathBuf>,
122 // Whether corpus to use gzip file compression and decompression.
123 pub corpus_gzip: bool,
124 // Number of mutations until entry marked as eligible to be flushed from in-memory corpus.
125 // Mutations will be performed at least `corpus_min_mutations` times.
126 pub corpus_min_mutations: usize,
127 // Number of corpus that won't be evicted from memory.
128 pub corpus_min_size: usize,
129 /// Whether to collect and display edge coverage metrics.
130 pub show_edge_coverage: bool,
131 /// Whether to collect edge coverage from native Rust crates compiled with
132 /// SanitizerCoverage instrumentation (e.g. precompile implementations).
133 /// Requires building forge with a `RUSTC_WRAPPER` that injects sancov flags.
134 pub sancov_edges: bool,
135 /// Whether to capture comparison operands from sancov-instrumented crates
136 /// and inject them into the fuzz dictionary. Independent of `sancov_edges`.
137 pub sancov_trace_cmp: bool,
138}
139
140impl FuzzCorpusConfig {
141 pub fn with_test(&mut self, contract: &str, test: &str) {
142 if let Some(corpus_dir) = &self.corpus_dir {
143 self.corpus_dir = Some(canonicalized(corpus_dir.join(contract).join(test)));
144 }
145 }
146
147 /// Whether any edge coverage (EVM or sancov) should be collected.
148 pub const fn collect_edge_coverage(&self) -> bool {
149 self.corpus_dir.is_some() || self.show_edge_coverage || self.sancov_edges
150 }
151
152 /// Whether the EVM `EdgeCovInspector` should be enabled.
153 ///
154 /// Disabled when sancov edge coverage is active — sancov provides the
155 /// coverage signal and EVM hits from the Solidity handler would dilute it.
156 /// Trace-cmp-only mode keeps EVM edges enabled since trace-cmp only
157 /// contributes dictionary entries, not edge coverage.
158 pub const fn collect_evm_edge_coverage(&self) -> bool {
159 !self.sancov_edges && (self.corpus_dir.is_some() || self.show_edge_coverage)
160 }
161
162 /// Whether EVM comparison operand capture is enabled.
163 ///
164 /// EVM comparison operands are only useful for coverage-guided fuzzing, so they are derived
165 /// from corpus mode. Disabled when sancov edge coverage is active because sancov replaces EVM
166 /// bytecode coverage as the guidance signal.
167 pub const fn collect_evm_cmp_log(&self) -> bool {
168 !self.sancov_edges && self.corpus_dir.is_some()
169 }
170
171 /// Whether sancov edge coverage collection is enabled.
172 pub const fn collect_sancov_edges(&self) -> bool {
173 self.sancov_edges
174 }
175
176 /// Whether sancov trace-cmp capture is enabled.
177 pub const fn collect_sancov_trace_cmp(&self) -> bool {
178 self.sancov_trace_cmp
179 }
180
181 /// Whether either sancov coverage mode is active.
182 pub const fn sancov_active(&self) -> bool {
183 self.sancov_edges || self.sancov_trace_cmp
184 }
185
186 /// Whether coverage guided fuzzing is enabled.
187 pub const fn is_coverage_guided(&self) -> bool {
188 self.corpus_dir.is_some()
189 }
190}
191
192impl Default for FuzzCorpusConfig {
193 fn default() -> Self {
194 Self {
195 corpus_dir: None,
196 corpus_gzip: true,
197 corpus_min_mutations: 5,
198 corpus_min_size: 0,
199 show_edge_coverage: false,
200 sancov_edges: false,
201 sancov_trace_cmp: false,
202 }
203 }
204}