1.3 KiB
Fuzzer environment on ClusterFuzz
Your fuzz targets will be run on a Google Compute Engine VM (Linux) with some security restrictions.
Dependencies
You should not make any assumptions on the availability of dependent packages
and libraries in the execution environment. Make sure to statically link any
library dependencies with your fuzz target executable during build time
(example).
All build artifacts needed during fuzz target execution should be inside $OUT
directory, and other directories like $WORK
, $SRC
, etc will not be accessible.
You can ensure that the fuzz target works correctly by using run_fuzzer
command
(see instructions here).
Current working directory
You should not make any assumptions about the current working directory of your
fuzz target. If you need to load data files, please use argv[0]
to get the
directory where your fuzz target executable is located.
File system
Everything except /tmp
is read-only, including the directory that your fuzz target
executable lives in.
/dev
is also unavailable.
Network access
There will be no network interfaces available (not even loopback).