-
Notifications
You must be signed in to change notification settings - Fork 84
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OSS-Fuzz: OSS-Fuzz fuzzing integration #534
Conversation
Signed-off-by: Arthur Chan <[email protected]>
Signed-off-by: Arthur Chan <[email protected]>
Looks good! But I think it's better to have a |
Signed-off-by: Arthur Chan <[email protected]>
Thanks for the suggestion. I have relocated the fuzz directory and fixes the Cargo.toml respectively. |
Signed-off-by: Arthur Chan <[email protected]>
@arthurscchan we had some other projects added to oss-fuzz but the contributor disappeared. They now send me emails periodically to say it's broken and I don't have time to look into fixing it. If we do this integration, are you interested in maintaining it going forward? |
Signed-off-by: Arthur Chan <[email protected]>
Signed-off-by: Arthur Chan <[email protected]>
Signed-off-by: Arthur Chan <[email protected]>
We're happy to maintain it's building! Which are the projects you're referring to, we could take a look at getting them build again. |
@DavidKorczynski the original PR was here: google/oss-fuzz#6908 Here are the failures: https://issues.oss-fuzz.com/issues/42515273 |
Signed-off-by: Arthur Chan <[email protected]>
Signed-off-by: Arthur Chan <[email protected]>
Signed-off-by: Arthur Chan <[email protected]>
@arthurscchan |
Thanks for helping me to fix the fuzzers. I this it is good. |
I merged the fuzz targets back into one. Now in addition to direct hashing using the |
Thanks. @newpavlov. For the OSS-Fuzz integration, could we use the email from your GH page as contact, such that you will receive notifications if issues are found? |
Thanks! We're happy to maintain this integration (password-hashes) but I think rustcrypto might be tricky because it relies on Cryptofuzz. @guidovranken is the right person to ask here -- @guidovranken do you about the build failures of rustcrypto? |
This PR initialises OSS-Fuzz integration for the scrypt project in Rust. New fuzzers have been created, and a PR (RustCrypto/password-hashes#534) has been submitted upstream to merge the fuzzers. --------- Signed-off-by: Arthur Chan <[email protected]>
Hi! Would you be interested in setting up fuzzing for the Scrypt module via OSS-Fuzz?
Fuzzing is essentially a stress-testing approach used to find bugs in software, and OSS-Fuzz is a free service run by Google that continuously fuzzes important open-source projects. Integrating your module with OSS-Fuzz could help uncover memory corruption issues that may exist.
This PR adds a Cargo fuzz configuration along with a fuzzer for the Scrypt module. In combination with an initial attempt in OSS-Fuzz (google/oss-fuzz#12629), it enables OSS-Fuzz to fuzz the Scrypt module while keeping the fuzzers upstream for further modification and expansion. If you're happy to proceed with the integration and store the fuzzers upstream, please let me know, and I'd be glad to provide more details if needed.
The only thing required at this point is an email associated with a Google account, which will be used to receive notifications when bugs are found.