Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

testing: support custom dictionaries in fuzzer #46508

rolandshoemaker opened this issue Jun 2, 2021 · 0 comments

testing: support custom dictionaries in fuzzer #46508

rolandshoemaker opened this issue Jun 2, 2021 · 0 comments
FeatureRequest fuzz NeedsInvestigation


Copy link

@rolandshoemaker rolandshoemaker commented Jun 2, 2021

#46507 suggests multiple strategies which make use of automatically generated dictionaries of interesting values. It is likely also valuable to allow users to generate their own dictionaries of interesting values, as is supported by AFL and libFuzzer, that the mutation engine can pull from.

The easiest solution for encoding the values is likely to use a similar encoding scheme to AFL and libFuzzer, so existing dictionaries can be easily reused. Both use quoted strings with \x byte encoding, e.g.:


AFL and libFuzzer support prefixing these values with a keyword (i.e. name="blah"), but do not use the name for anything. It seems reasonable to support this, so dictionaries can be directly imported, but to just ignore these values. Lines prefixed with # are ignored.

These dictionaries could be consumed from the testdata folder, similarly to the testdata/corpus seed inputs, and by extending the testing.F API with something like func (f *F) AddDictionaryEntry([]byte).

@rolandshoemaker rolandshoemaker added the fuzz label Jun 2, 2021
@dr2chase dr2chase added the NeedsInvestigation label Jun 4, 2021
@katiehockman katiehockman added this to the Backlog milestone Sep 14, 2021
@rsc rsc changed the title [dev.fuzz] testing: support custom dictionaries testing: support custom dictionaries in fuzzer Sep 21, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
FeatureRequest fuzz NeedsInvestigation
None yet

No branches or pull requests

3 participants