Cw305 glitch attack

Hi, I want to do a glitch attack with the cw305 board. Does anyone have a ready-made or bug-free source code so I can do several test attacks?

We don’t have a CW305 glitch tutorial. The same principles that we teach in our fault course notebooks apply, but with the added problem that glitching an FPGA will sometimes corrupt the bitstream and require it to be reloaded.

Thank you very much for your answer.
How do we know that the bitstream is corrupted and needs to be reloaded? Do you know a way to do it?

target.is_programmed may work; you can also infer it by testing whether communication with the FPGA is working normally.