diff --git a/eth2/utils/eth2_hashing/fuzz/.gitignore b/eth2/utils/eth2_hashing/fuzz/.gitignore
deleted file mode 100644
index 572e03bdf..000000000
--- a/eth2/utils/eth2_hashing/fuzz/.gitignore
+++ /dev/null
@@ -1,4 +0,0 @@
-
-target
-corpus
-artifacts
diff --git a/eth2/utils/eth2_hashing/fuzz/Cargo.toml b/eth2/utils/eth2_hashing/fuzz/Cargo.toml
deleted file mode 100644
index 57e0172eb..000000000
--- a/eth2/utils/eth2_hashing/fuzz/Cargo.toml
+++ /dev/null
@@ -1,22 +0,0 @@
-
-[package]
-name = "hashing-fuzz"
-version = "0.0.1"
-authors = ["Automatically generated"]
-publish = false
-
-[package.metadata]
-cargo-fuzz = true
-
-[dependencies.hashing]
-path = ".."
-[dependencies.libfuzzer-sys]
-git = "https://github.com/rust-fuzz/libfuzzer-sys.git"
-
-# Prevent this from interfering with workspaces
-[workspace]
-members = ["."]
-
-[[bin]]
-name = "fuzz_target_hash"
-path = "fuzz_targets/fuzz_target_hash.rs"
diff --git a/eth2/utils/eth2_hashing/fuzz/fuzz_targets/fuzz_target_hash.rs b/eth2/utils/eth2_hashing/fuzz/fuzz_targets/fuzz_target_hash.rs
deleted file mode 100644
index dd78d1ac8..000000000
--- a/eth2/utils/eth2_hashing/fuzz/fuzz_targets/fuzz_target_hash.rs
+++ /dev/null
@@ -1,9 +0,0 @@
-#![no_main]
-#[macro_use] extern crate libfuzzer_sys;
-extern crate hashing;
-
-use hashing::hash;
-
-fuzz_target!(|data: &[u8]| {
- let _result = hash(data);
-});
diff --git a/eth2/utils/ssz/fuzz/.gitignore b/eth2/utils/ssz/fuzz/.gitignore
deleted file mode 100644
index 572e03bdf..000000000
--- a/eth2/utils/ssz/fuzz/.gitignore
+++ /dev/null
@@ -1,4 +0,0 @@
-
-target
-corpus
-artifacts
diff --git a/eth2/utils/ssz/fuzz/Cargo.toml b/eth2/utils/ssz/fuzz/Cargo.toml
deleted file mode 100644
index 3c922bac9..000000000
--- a/eth2/utils/ssz/fuzz/Cargo.toml
+++ /dev/null
@@ -1,105 +0,0 @@
-
-[package]
-name = "ssz-fuzz"
-version = "0.0.1"
-authors = ["Automatically generated"]
-publish = false
-
-[package.metadata]
-cargo-fuzz = true
-
-[dependencies]
-ethereum-types = "0.6"
-
-[dependencies.ssz]
-path = ".."
-[dependencies.libfuzzer-sys]
-git = "https://github.com/rust-fuzz/libfuzzer-sys.git"
-
-# Prevent this from interfering with workspaces
-[workspace]
-members = ["."]
-
-[[bin]]
-name = "fuzz_target_bool_decode"
-path = "fuzz_targets/fuzz_target_bool_decode.rs"
-
-[[bin]]
-name = "fuzz_target_bool_encode"
-path = "fuzz_targets/fuzz_target_bool_encode.rs"
-
-[[bin]]
-name = "fuzz_target_u8_decode"
-path = "fuzz_targets/fuzz_target_u8_decode.rs"
-
-[[bin]]
-name = "fuzz_target_u8_encode"
-path = "fuzz_targets/fuzz_target_u8_encode.rs"
-
-[[bin]]
-name = "fuzz_target_u16_decode"
-path = "fuzz_targets/fuzz_target_u16_decode.rs"
-
-[[bin]]
-name = "fuzz_target_u16_encode"
-path = "fuzz_targets/fuzz_target_u16_encode.rs"
-
-[[bin]]
-name = "fuzz_target_u32_decode"
-path = "fuzz_targets/fuzz_target_u32_decode.rs"
-
-[[bin]]
-name = "fuzz_target_u32_encode"
-path = "fuzz_targets/fuzz_target_u32_encode.rs"
-
-[[bin]]
-name = "fuzz_target_u64_decode"
-path = "fuzz_targets/fuzz_target_u64_decode.rs"
-
-[[bin]]
-name = "fuzz_target_u64_encode"
-path = "fuzz_targets/fuzz_target_u64_encode.rs"
-
-[[bin]]
-name = "fuzz_target_usize_decode"
-path = "fuzz_targets/fuzz_target_usize_decode.rs"
-
-[[bin]]
-name = "fuzz_target_usize_encode"
-path = "fuzz_targets/fuzz_target_usize_encode.rs"
-
-[[bin]]
-name = "fuzz_target_hash256_decode"
-path = "fuzz_targets/fuzz_target_hash256_decode.rs"
-
-[[bin]]
-name = "fuzz_target_hash256_encode"
-path = "fuzz_targets/fuzz_target_hash256_encode.rs"
-
-[[bin]]
-name = "fuzz_target_address_decode"
-path = "fuzz_targets/fuzz_target_address_decode.rs"
-
-[[bin]]
-name = "fuzz_target_address_encode"
-path = "fuzz_targets/fuzz_target_address_encode.rs"
-
-[[bin]]
-name = "fuzz_target_vec_address_decode"
-path = "fuzz_targets/fuzz_target_vec_address_decode.rs"
-
-[[bin]]
-name = "fuzz_target_vec_bool_decode"
-path = "fuzz_targets/fuzz_target_vec_bool_decode.rs"
-
-[[bin]]
-name = "fuzz_target_vec_decode"
-path = "fuzz_targets/fuzz_target_vec_decode.rs"
-
-[[bin]]
-name = "fuzz_target_vec_encode"
-path = "fuzz_targets/fuzz_target_vec_encode.rs"
-
-[[bin]]
-name = "fuzz_target_vec_u64_decode"
-path = "fuzz_targets/fuzz_target_vec_u64_decode.rs"
diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_address_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_address_decode.rs
deleted file mode 100644
index 03ec386ad..000000000
--- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_address_decode.rs
+++ /dev/null
@@ -1,20 +0,0 @@
-#![no_main]
-#[macro_use] extern crate libfuzzer_sys;
-extern crate ethereum_types;
-extern crate ssz;
-
-use ethereum_types::Address;
-use ssz::{DecodeError, decode};
-
-// Fuzz ssz_decode()
-fuzz_target!(|data: &[u8]| {
- let result: Result
= decode(data);
- if data.len() == 20 {
- // Should have valid result
- let address = result.unwrap();
- assert_eq!(address, Address::from_slice(&data[..20]));
- } else {
- // Length of less than 32 should return error
- assert!(result.is_err());
- }
-});
diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_address_encode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_address_encode.rs
deleted file mode 100644
index 0e51e00ac..000000000
--- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_address_encode.rs
+++ /dev/null
@@ -1,20 +0,0 @@
-#![no_main]
-#[macro_use] extern crate libfuzzer_sys;
-extern crate ethereum_types;
-extern crate ssz;
-
-use ethereum_types::Address;
-use ssz::SszStream;
-
-// Fuzz ssz_encode (via ssz_append)
-fuzz_target!(|data: &[u8]| {
- let mut ssz = SszStream::new();
- if data.len() >= 20 {
- let hash = Address::from_slice(&data[..20]);
- ssz.append(&hash);
- let ssz = ssz.drain();
-
- assert_eq!(data[..20], ssz[..20]);
- assert_eq!(ssz.len(), 20);
- }
-});
diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_bool_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_bool_decode.rs
deleted file mode 100644
index fe555385c..000000000
--- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_bool_decode.rs
+++ /dev/null
@@ -1,24 +0,0 @@
-#![no_main]
-#[macro_use] extern crate libfuzzer_sys;
-extern crate ssz;
-
-use ssz::{DecodeError, decode};
-
-// Fuzz ssz_decode()
-fuzz_target!(|data: &[u8]| {
- let result: Result = decode(data);
- if data.len() == 1 {
- if data[0] == 1 {
- let val_bool = result.unwrap();
- assert!(val_bool);
- } else if data[0] == 0 {
- let val_bool = result.unwrap();
- assert!(!val_bool);
- } else {
- assert_eq!(result, Err(DecodeError::Invalid));
- }
- } else {
- // Length of 0 should return error
- assert!(result.is_err());
- }
-});
diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_bool_encode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_bool_encode.rs
deleted file mode 100644
index 516551538..000000000
--- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_bool_encode.rs
+++ /dev/null
@@ -1,20 +0,0 @@
-#![no_main]
-#[macro_use] extern crate libfuzzer_sys;
-extern crate ssz;
-
-use ssz::SszStream;
-
-// Fuzz ssz_encode (via ssz_append)
-fuzz_target!(|data: &[u8]| {
- let mut ssz = SszStream::new();
- let mut val_bool = 0;
- if data.len() >= 1 {
- val_bool = data[0] % u8::pow(2, 6);
- }
-
- ssz.append(&val_bool);
- let ssz = ssz.drain();
-
- assert_eq!(val_bool, ssz[0]);
- assert_eq!(ssz.len(), 1);
-});
diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_hash256_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_hash256_decode.rs
deleted file mode 100644
index fd34844d8..000000000
--- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_hash256_decode.rs
+++ /dev/null
@@ -1,20 +0,0 @@
-#![no_main]
-#[macro_use] extern crate libfuzzer_sys;
-extern crate ethereum_types;
-extern crate ssz;
-
-use ethereum_types::H256;
-use ssz::{DecodeError, decode};
-
-// Fuzz ssz_decode()
-fuzz_target!(|data: &[u8]| {
- let result: Result = decode(data);
- if data.len() == 32 {
- // Should have valid result
- let hash = result.unwrap();
- assert_eq!(hash, H256::from_slice(&data[..32]));
- } else {
- // Length of less than 32 should return error
- assert!(result.is_err());
- }
-});
diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_hash256_encode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_hash256_encode.rs
deleted file mode 100644
index 537d9cdf9..000000000
--- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_hash256_encode.rs
+++ /dev/null
@@ -1,20 +0,0 @@
-#![no_main]
-#[macro_use] extern crate libfuzzer_sys;
-extern crate ethereum_types;
-extern crate ssz;
-
-use ethereum_types::H256;
-use ssz::SszStream;
-
-// Fuzz ssz_encode (via ssz_append)
-fuzz_target!(|data: &[u8]| {
- let mut ssz = SszStream::new();
- if data.len() >= 32 {
- let hash = H256::from_slice(&data[..32]);
- ssz.append(&hash);
- let ssz = ssz.drain();
-
- assert_eq!(data[..32], ssz[..32]);
- assert_eq!(ssz.len(), 32);
- }
-});
diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u16_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u16_decode.rs
deleted file mode 100644
index e5f24ea88..000000000
--- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u16_decode.rs
+++ /dev/null
@@ -1,19 +0,0 @@
-#![no_main]
-#[macro_use] extern crate libfuzzer_sys;
-extern crate ssz;
-
-use ssz::{DecodeError, decode};
-
-// Fuzz ssz_decode()
-fuzz_target!(|data: &[u8]| {
- let result: Result = decode(data);
- if data.len() == 2 {
- // Valid result
- let number_u16 = result.unwrap();
- let val = u16::from_le_bytes([data[0], data[1]]);
- assert_eq!(number_u16, val);
- } else {
- // Length of 0 or 1 should return error
- assert!(result.is_err());
- }
-});
diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u16_encode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u16_encode.rs
deleted file mode 100644
index 2dea8bb73..000000000
--- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u16_encode.rs
+++ /dev/null
@@ -1,20 +0,0 @@
-#![no_main]
-#[macro_use] extern crate libfuzzer_sys;
-extern crate ssz;
-
-use ssz::SszStream;
-
-// Fuzz ssz_encode (via ssz_append)
-fuzz_target!(|data: &[u8]| {
- let mut ssz = SszStream::new();
- let mut number_u16 = 0;
- if data.len() >= 2 {
- number_u16 = u16::from_be_bytes([data[0], data[1]]);
- }
-
- ssz.append(&number_u16);
- let ssz = ssz.drain();
-
- assert_eq!(ssz.len(), 2);
- assert_eq!(number_u16, u16::from_le_bytes([ssz[0], ssz[1]]));
-});
diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u32_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u32_decode.rs
deleted file mode 100644
index f00c338fc..000000000
--- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u32_decode.rs
+++ /dev/null
@@ -1,19 +0,0 @@
-#![no_main]
-#[macro_use] extern crate libfuzzer_sys;
-extern crate ssz;
-
-use ssz::{DecodeError, decode};
-
-// Fuzz ssz_decode()
-fuzz_target!(|data: &[u8]| {
- let result: Result = decode(data);
- if data.len() == 4 {
- // Valid result
- let number_u32 = result.unwrap();
- let val = u32::from_le_bytes([data[0], data[1], data[2], data[3]]);
- assert_eq!(number_u32, val);
- } else {
- // Length not 4 should return error
- assert!(result.is_err());
- }
-});
diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u32_encode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u32_encode.rs
deleted file mode 100644
index db3b750a7..000000000
--- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u32_encode.rs
+++ /dev/null
@@ -1,20 +0,0 @@
-#![no_main]
-#[macro_use] extern crate libfuzzer_sys;
-extern crate ssz;
-
-use ssz::SszStream;
-
-// Fuzz ssz_encode (via ssz_append)
-fuzz_target!(|data: &[u8]| {
- let mut ssz = SszStream::new();
- let mut number_u32 = 0;
- if data.len() >= 4 {
- number_u32 = u32::from_be_bytes([data[0], data[1], data[2], data[3]]);
- }
-
- ssz.append(&number_u32);
- let ssz = ssz.drain();
-
- assert_eq!(ssz.len(), 4);
- assert_eq!(number_u32, u32::from_le_bytes([ssz[0], ssz[1], ssz[2], ssz[3]]));
-});
diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u64_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u64_decode.rs
deleted file mode 100644
index f5c2794da..000000000
--- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u64_decode.rs
+++ /dev/null
@@ -1,28 +0,0 @@
-#![no_main]
-#[macro_use] extern crate libfuzzer_sys;
-extern crate ssz;
-
-use ssz::{DecodeError, decode};
-
-// Fuzz ssz_decode()
-fuzz_target!(|data: &[u8]| {
- let result: Result = decode(data);
- if data.len() == 8 {
- // Valid result
- let number_u64 = result.unwrap();
- let val = u64::from_le_bytes([
- data[0],
- data[1],
- data[2],
- data[3],
- data[4],
- data[5],
- data[6],
- data[7],
- ]);
- assert_eq!(number_u64, val);
- } else {
- // Length not 8 should return error
- assert!(result.is_err());
- }
-});
diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u64_encode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u64_encode.rs
deleted file mode 100644
index 6301fa86b..000000000
--- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u64_encode.rs
+++ /dev/null
@@ -1,38 +0,0 @@
-#![no_main]
-#[macro_use] extern crate libfuzzer_sys;
-extern crate ssz;
-
-use ssz::SszStream;
-
-// Fuzz ssz_encode (via ssz_append)
-fuzz_target!(|data: &[u8]| {
- let mut ssz = SszStream::new();
- let mut number_u64 = 0;
- if data.len() >= 8 {
- number_u64 = u64::from_le_bytes([
- data[0],
- data[1],
- data[2],
- data[3],
- data[4],
- data[5],
- data[6],
- data[7],
- ]);
- }
-
- ssz.append(&number_u64);
- let ssz = ssz.drain();
-
- assert_eq!(ssz.len(), 8);
- assert_eq!(number_u64, u64::from_le_bytes([
- ssz[0],
- ssz[1],
- ssz[2],
- ssz[3],
- ssz[4],
- ssz[5],
- ssz[6],
- ssz[7],
- ]));
-});
diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u8_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u8_decode.rs
deleted file mode 100644
index 4fcf9e220..000000000
--- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u8_decode.rs
+++ /dev/null
@@ -1,18 +0,0 @@
-#![no_main]
-#[macro_use] extern crate libfuzzer_sys;
-extern crate ssz;
-
-use ssz::{DecodeError, decode};
-
-// Fuzz ssz_decode()
-fuzz_target!(|data: &[u8]| {
- let result: Result = decode(data);
- if data.len() == 1 {
- // Should have valid result
- let number_u8 = result.unwrap();
- assert_eq!(number_u8, data[0]);
- } else {
- // Length not 1 should return error
- assert!(result.is_err());
- }
-});
diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u8_encode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u8_encode.rs
deleted file mode 100644
index fa1437948..000000000
--- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_u8_encode.rs
+++ /dev/null
@@ -1,20 +0,0 @@
-#![no_main]
-#[macro_use] extern crate libfuzzer_sys;
-extern crate ssz;
-
-use ssz::SszStream;
-
-// Fuzz ssz_encode (via ssz_append)
-fuzz_target!(|data: &[u8]| {
- let mut ssz = SszStream::new();
- let mut number_u8 = 0;
- if data.len() >= 1 {
- number_u8 = data[0];
- }
-
- ssz.append(&number_u8);
- let ssz = ssz.drain();
-
- assert_eq!(number_u8, ssz[0]);
- assert_eq!(ssz.len(), 1);
-});
diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_usize_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_usize_decode.rs
deleted file mode 100644
index 89ac62dce..000000000
--- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_usize_decode.rs
+++ /dev/null
@@ -1,29 +0,0 @@
-#![no_main]
-#[macro_use] extern crate libfuzzer_sys;
-extern crate ssz;
-
-use ssz::{DecodeError, decode};
-
-// Fuzz decode()
-fuzz_target!(|data: &[u8]| {
- // Note: we assume architecture is 64 bit -> usize == 64 bits
- let result: Result = decode(data);
- if data.len() == 8 {
- // Valid result
- let number_usize = result.unwrap();
- let val = u64::from_le_bytes([
- data[0],
- data[1],
- data[2],
- data[3],
- data[4],
- data[5],
- data[6],
- data[7],
- ]);
- assert_eq!(number_usize, val as usize);
- } else {
- // Length less then 8 should return error
- assert!(result.is_err());
- }
-});
diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_usize_encode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_usize_encode.rs
deleted file mode 100644
index a2c804311..000000000
--- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_usize_encode.rs
+++ /dev/null
@@ -1,38 +0,0 @@
-#![no_main]
-#[macro_use] extern crate libfuzzer_sys;
-extern crate ssz;
-
-use ssz::SszStream;
-
-// Fuzz ssz_encode (via ssz_append)
-fuzz_target!(|data: &[u8]| {
- let mut ssz = SszStream::new();
- let mut number_usize = 0;
- if data.len() >= 8 {
- number_usize = u64::from_le_bytes([
- data[0],
- data[1],
- data[2],
- data[3],
- data[4],
- data[5],
- data[6],
- data[7],
- ]) as usize;
- }
-
- ssz.append(&number_usize);
- let ssz = ssz.drain();
-
- assert_eq!(ssz.len(), 8);
- assert_eq!(number_usize, u64::from_le_bytes([
- ssz[0],
- ssz[1],
- ssz[2],
- ssz[3],
- ssz[4],
- ssz[5],
- ssz[6],
- ssz[7],
- ]) as usize);
-});
diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_address_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_address_decode.rs
deleted file mode 100644
index 6b78862a2..000000000
--- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_address_decode.rs
+++ /dev/null
@@ -1,12 +0,0 @@
-#![no_main]
-#[macro_use] extern crate libfuzzer_sys;
-extern crate ethereum_types;
-extern crate ssz;
-
-use ethereum_types::{Address};
-use ssz::{decode, DecodeError};
-
-// Fuzz ssz_decode()
-fuzz_target!(|data: &[u8]| {
- let _result: Result, DecodeError> = decode(data);
-});
diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_bool_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_bool_decode.rs
deleted file mode 100644
index ceff2652f..000000000
--- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_bool_decode.rs
+++ /dev/null
@@ -1,10 +0,0 @@
-#![no_main]
-#[macro_use] extern crate libfuzzer_sys;
-extern crate ssz;
-
-use ssz::{decode, DecodeError};
-
-// Fuzz ssz_decode()
-fuzz_target!(|data: &[u8]| {
- let _result: Result, DecodeError> = decode(data);
-});
diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_decode.rs
deleted file mode 100644
index 0605a011b..000000000
--- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_decode.rs
+++ /dev/null
@@ -1,11 +0,0 @@
-#![no_main]
-#[macro_use] extern crate libfuzzer_sys;
-extern crate ethereum_types;
-extern crate ssz;
-
-use ssz::{decode, DecodeError, Decodable};
-
-// Fuzz ssz_decode()
-fuzz_target!(|data: &[u8]| {
- let _result: Result, DecodeError> = decode(data);
-});
diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_encode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_encode.rs
deleted file mode 100644
index 4b56aa60b..000000000
--- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_encode.rs
+++ /dev/null
@@ -1,14 +0,0 @@
-#![no_main]
-#[macro_use] extern crate libfuzzer_sys;
-extern crate ethereum_types;
-extern crate ssz;
-
-use ssz::SszStream;
-
-// Fuzz ssz_encode()
-fuzz_target!(|data: &[u8]| {
-
- let mut ssz = SszStream::new();
- let data_vec = data.to_vec();
- ssz.append(&data_vec);
-});
diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_u64_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_u64_decode.rs
deleted file mode 100644
index 56f808f36..000000000
--- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_u64_decode.rs
+++ /dev/null
@@ -1,10 +0,0 @@
-#![no_main]
-#[macro_use] extern crate libfuzzer_sys;
-extern crate ssz;
-
-use ssz::{decode, DecodeError};
-
-// Fuzz ssz_decode()
-fuzz_target!(|data: &[u8]| {
- let _result: Result, DecodeError> = decode(data);
-});