OSS-Fuzz - continuous fuzzing for open source software.
Go to file
Mike Aizatsky ecc3c98b3e typo 2016-12-06 13:51:34 -08:00
docs Update corpora.md 2016-12-06 13:22:13 -08:00
infra Update README.md 2016-12-05 09:44:57 -08:00
projects typo 2016-12-06 13:51:34 -08:00
.gitignore Implement a helper script. 2016-09-01 16:37:12 -07:00
CONTRIBUTING Create CONTRIBUTING 2016-10-12 13:26:26 -07:00
LICENSE Create LICENSE 2016-10-03 12:24:25 -07:00
README.md Update README.md 2016-12-02 22:22:50 -08:00

README.md

OSS-Fuzz - Continuous Fuzzing for Open Source Software

Status: Beta. We are now accepting applications from widely used open source projects.

FAQ | Ideal Fuzzing Integration | New Project Guide | Reproducing Bugs | Projects | Projects Issue Tracker | Glossary

Create New Issue for questions or feedback about OSS-Fuzz.

Introduction

Fuzz testing is a well-known technique for uncovering various kinds of programming errors in software. Many of these detectable errors (e.g. buffer overflow) can have serious security implications.

We successfully deployed guided in-process fuzzing of Chrome components and found hundreds of security vulnerabilities and stability bugs. We now want to share the experience and the service with the open source community.

In cooperation with the Core Infrastructure Initiative, OSS-Fuzz aims to make common open source software more secure and stable by combining modern fuzzing techniques and scalable distributed execution.

At the first stage of the project we use libFuzzer with Sanitizers. More fuzzing engines will be added later. ClusterFuzz provides distributed fuzzer execution environment and reporting.

Currently OSS-Fuzz supports C and C++ code (other languages supported by LLVM may work too).

Process Overview

The following process is used for projects in OSS-Fuzz:

Accepting New Projects

To be accepted to OSS-Fuzz, an open-source project must have a significant user base and/or be critical to the global IT infrastructure. To submit a new project:

  • Create a pull request with new projects/<project_name>/project.yaml file (example) giving at least the following information:
    • project homepage.
    • e-mail of the engineering contact person to be CCed on new issues. This email should be
      linked to a Google Account (why?) and belong to an established project committer (according to VCS logs). If this is not you or the email address differs from VCS, an informal e-mail verification will be required.
    • Note that project_name can only contain alphanumeric characters, underscores(_) or dashes(-).
  • Once accepted by an OSS-Fuzz project member, follow the New Project Guide to write the code.

Bug Disclosure Guidelines

Following Google's standard disclosure policy OSS-Fuzz will adhere to following disclosure principles:

  • 90-day deadline. After notifying project authors, we will open reported issues in 90 days, or 7 days after the fix is released.
  • Weekends and holidays. If a deadline is due to expire on a weekend or US public holiday, the deadline will be moved to the next normal work day.
  • Grace period. We have a 14-day grace period. If a 90-day deadline expires but the upstream engineers let us know before the deadline that a patch is scheduled for release on a specific day within 14 days following the deadline, the public disclosure will be delayed until the availability of the patch.

More Documentation

Build Status

This page gives the latest build logs for each project.

Trophies

This page gives a list of publically viewable fixed bugs found by OSS-Fuzz.

References