-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Initial fuzzing set up #6832
base: main
Are you sure you want to change the base?
Initial fuzzing set up #6832
Conversation
|
@DavidKorczynski thanks, we use the cncf/lf cla for this project vs dco per the bot message. we'll also need to add in a dep dependency for atheris, i'm happy to do that once the cla is taken care of. |
|
Thanks Kapil, I actually thought I did this - but I had to register our organisation (Ada Logics) fist. My thought was it would just take some time - will look into this a bit later! |
|
will the CLA update automatically after I have signed or do I need to do something to trigger it? |
|
ugh.. it should auto update, but we've had at least one other person with issues in this, where i had to manually check the tool because it didn't auto update. |
|
Hmm - there might have been some oddities since I both had to create an organisation and then put myself on the approved list on the CLA. However, I am pretty should I have done what could be done for the signing now. I have issued a ticket for the Linux Foundation support. |
|
@kapilt got the CLA done :)! |
|
thanks reproduced on the fuzz result, i'm a little unclear the parse url config err as anything needing specific handling, the date parse is actually pretty useful to fuzz, in that it does get called with untrusted inputs, as we parse tag values from resources (aka potentially attacker controlled). added in to dev deps for wrt to packaging, currently doing a run to see total run time and if we can add as a github action. |
Great (that the fuzzing was useful)!
We can! There is "CIFuzz" which allows continuous integration of fuzzing: https://google.github.io/oss-fuzz/getting-started/continuous-integration/ |
|
FYI, I integrated urllib3 into OSS-Fuzz earlier this year and it is being fuzzed: https://github.com/google/oss-fuzz/tree/master/projects/urllib3 |
|
@kapilt how are we doing on this one? It would be great to get it merged in as I am looking to write some CNCF documentation referencing the fuzzing set up here |
@kapilt following our discussion I added a fuzzing set up. I also added a doc clarifying fuzzing of cloud-custodian and why there is not a ton to come for.
Please take a look. If you run the fuzzer you shuld be able to trigger and uncaught exception: