Web3 Security Tools Seminar (W3ST) 2026
What is it?
The Web3 Security Tools Seminar (W3ST) is a focused gathering of developers and researchers who are building security-focused tools in the blockchain ecosystem.
No business pitches. No marketing. Just deep technical exchange.
This is a discussion-driven seminar where we prioritize interactive exchange over polished presentations. We especially welcome work-in-progress and early-stage ideas that can spark meaningful technical conversations.
Goals
- Share challenges and insights from building tools (static analysis, fuzzers, formal verification, AI, etc.)
- Discuss works-in-progress, experimental approaches, and half-baked ideas that need community feedback
- Bridge the security tooling community by exchanging ideas between teams, ecosystems, and open-source efforts
- Participate by asking questions, sharing insights, and contributing to discussions. This is a collaborative event, not just a series of lectures.
Call for Presentations
Submissions open until March 14th, 2026
We are looking for presentations that detail the technical aspects of tooling development. The target audience is fellow security tool experts, so we are seeking deeply technical submissions.
What We’re Looking For
We especially encourage work-in-progress presentations. This seminar thrives on live discussion, so incomplete ideas, experimental approaches, and ongoing research are not just welcome, they’re preferred. Share your challenges, partial solutions, and open questions with fellow tool builders.
Perfect submissions include:
- Experimental techniques you’re still validating
- Architectural decisions you’re debating
- Performance bottlenecks you’re trying to solve
- Novel approaches that need peer feedback
- Failed experiments with interesting lessons
- Early prototypes seeking community input
The following are examples of questions we would love to see discussed (not exhaustive):
- What EVM opcodes were the most challenging for your tool to support, and how did you overcome those challenges?
- What particular difficulties did you encounter when applying your Ethereum-based analysis to another chain?
- How do you balance speed with smart heuristics in your fuzzer?
- What strategies does your fuzzer use for its feedback loop?
- What lessons did you learn from using LLVM for EVM?
- What over- or under-approximation techniques did you use, and how did you decide between them?
- What heuristics do you follow to balance false positives and false negatives?
- How did you optimize your loop fixpoint to speed up your analysis?
- What prompt-engineering techniques were the most impactful in your LLM-based tool?
- How have LLMs improved your tools?
- How vibe coding change your approach to program analysis?
- What unexpected challenges emerged when scaling your tool to production?
- What design decisions would you revisit given what you know now?
Submissions on proprietary or closed-source tools are welcome, provided they share meaningful technical details.
Register Your Interest
Due to limited capacity, we’re maintaining a waiting list. Priority will be given to accepted speakers and active contributors to the security tooling ecosystem.
Logistics
- When: March 31th, during EthCC week (2-7pm)
- Where: Cannes, France (limited seats). The event will take place outside of EthCC main’s venue, so no EthCC’s ticket are needed
- Registration: Join the waiting list - priority for speakers and contributors
For questions: josselin@seceureka.com
Previous Edition
Interested in W3ST 2025? View the previous edition
Web3 Security Tools Seminar (W3ST) maintained by montyly
Published with GitHub Pages