1.4 KiB
Fuzzer environment on ClusterFuzz
Your fuzz targets will be run on a Google Compute Engine VM (Linux) with some security restrictions.
Dependencies
You should not make any assumptions on the availability of dependent packages
and libraries in the execution environment. Make sure to statically link any
library dependencies with your fuzz target executable during build time
(example).
All build artifacts needed during fuzz target execution should be inside $OUT
directory. Other directories like $WORK
, $SRC
OR dependent packages installed
in build.sh will not be available.
You can ensure that the fuzz target works correctly by using run_fuzzer
command
(see instructions here). This command uses
a clean base-runner docker container and not the base-builder docker container
created during build-time.
Current working directory
You should not make any assumptions about the current working directory of your
fuzz target. If you need to load data files, please use argv[0]
to get the
directory where your fuzz target executable is located.
File system
Everything except /tmp
is read-only, including the directory that your fuzz target
executable lives in.
/dev
is also unavailable.
Network access
There will be no network interfaces available (not even loopback).