diff --git a/README.md b/README.md index 603dd48..85738a1 100755 --- a/README.md +++ b/README.md @@ -7,9 +7,7 @@ CrossFuzz: Cross-Contract Fuzzing for Smart Contract Vulnerability Detection. * Install env and dependencies, follow the instructions below: ```shell -sudo apt install python3.8 python3-distutils python3-dev gcc docker.io -sudo groupadd docker -sudo usermod -aG docker ${USER} +sudo apt install python3.8 python3-distutils python3-dev gcc pip install -r requirements.txt solc-select install 0.4.26 solc-select use 0.4.26 @@ -20,7 +18,7 @@ solc-select use 0.4.26 ### Usage -* config `CrossFuzz.py`, you can run a simple when you first run it. Follow the code below and run `test_run()` +* Config `CrossFuzz.py`, you can run a simple when you first run it. Follow the code below and run `test_run()` function. This demo will run a simple fuzzer on `examples/T.sol` and generate test cases in `fuzzer/result/res.json` directory. @@ -131,7 +129,7 @@ if __name__ == "__main__": ``` * Suppose the smart contract file you want to test is `examples/T.sol`, the name of the contract under tested is `E`, - the version of solc compiler is `0.4.26`, the max length of transaction sequence is `5`, fuzz time is `60` second. + the version of solc compiler is `0.4.26`, the max length of transaction sequence is `5`, fuzz time is `60` second and the binary path of solc compiler is `/usr/local/bin/solc`. Then you can run the following command to test it: @@ -144,4 +142,4 @@ python CrossFuzz.py examples/T.sol E 0.4.26 5 60 ./res.json /usr/local/bin/solc ### Links and copyright * This repo is based on [ConFuzzius](https://github.com/christoftorres/ConFuzzius). `ConFuzzius` is licensed under the - MIT License - see the `LICENSE` file for details. \ No newline at end of file + MIT License - see the `LICENSE` file for details.