-
Notifications
You must be signed in to change notification settings - Fork 164
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fuzzing RequestFromRekor API #488
Conversation
1ac46f2
to
64770c0
Compare
Now that I think of it we can probably run it as part of the CI as Fuzzlite https://security.googleblog.com/2021/11/clusterfuzzlite-continuous-fuzzing-for.html |
An immediate crash within
|
9ff68e3
to
17d4627
Compare
17d4627
to
14b3441
Compare
Can we put |
5413339
to
30cbcae
Compare
Thanks, Didn't see that. It would help to have it in the CONTRIBUTING.md. I have changed it to use the |
30cbcae
to
24002de
Compare
@bobcallaway A friendly ping. |
24002de
to
0bd5706
Compare
Fuzzing the RequestFromRekor API call using go-fuzz. Signed-off-by: naveen <172697+naveensrinivasan@users.noreply.github.com>
0bd5706
to
103b9be
Compare
Summary
The first steps into fuzzing rekor.
Fuzzing the RequestFromRekor API call using go-fuzz is the standard for fuzzing within
go
. Until go1.18
is out and until when it is upgraded this could be a good start IMO.The goal is to integrate this into oss-fuzz using
libfuzzer
https://google.github.io/oss-fuzz/getting-started/new-project-guide/go-lang/ cc @inferno-chromiumThe PR isn't done, I wanted to get some feedback.