mirror of https://github.com/google/oss-fuzz.git
18 lines
845 B
Markdown
18 lines
845 B
Markdown
# Frequently Asked Questions
|
|
|
|
## Why do you use a [different issue tracker](https://bugs.chromium.org/p/oss-fuzz/issues/list) for reporting bugs in fuzz targets?
|
|
|
|
Security access control is important for the kind of issues that OSS-Fuzz detects.
|
|
We will reconsider github issue tracker once there are access control
|
|
features available.
|
|
|
|
## Why do you use Docker?
|
|
|
|
Building fuzzers requires building your target with a fresh Clang compiler and special compiler flags.
|
|
An easy-to-use Docker image is provided to simplify toolchain distribution. This also limits our exposure
|
|
to multitude of Linux varieties and provides a reproducible and (more) secure environment for fuzzer
|
|
building and execution.
|
|
|
|
If you'd like to get more familiar with how libFuzzer-style fuzzers work in
|
|
general, check out [this page](http://llvm.org/docs/LibFuzzer.html).
|