The FuzzEd editor for dependability modeling and analysis.
Clone or download
Latest commit a685e9f May 24, 2018

Build Status Security Status Scrutinizer Code Quality

ORE - The Open Reliability Editor (former FuzzEd)

Note: FuzzEd becomes ORE. We are in the middle of that process, so don't get confused while both names are still in use.

ORE is an browser-based editor for drawing and analyzing dependability models. The currently supported types are:

  • Fault Tree Diagrams
  • FuzzTree Diagrams
  • Reliability Block Diagrams
  • Data Flow Diagrams

The editor supports the following generic features for all diagram types:

  • Organization of diagrams in projects, per user.
  • Sharing of (read-only) graphs between users of the same installation. We use that heavily for education scenarios.
  • Creation of diagram snapshots.
  • Full clipboard functionality inside the editor.
  • LaTEX, PDF and EPS export for some diagram types.
  • GraphML export for all diagram types.
  • Analytical and simulation-based analysis of fault tree and FuzzTree diagrams.
  • REST API for creating new diagrams with external software.

You can try the editor at


Thanks for your interest in this project. We would love to have you on-board. The developers discuss in the ORE forum.

The only supported environment for development is a Docker image.

Get a checkout and run:

make shell

This installs a complete development environment in a new Docker image on your machine and enters it.

Inside the container, you can use SCons to build neccessary static code parts:

scons frontend backend

If this was successful, you need to initialize the database once:

./ migrate

Now you can start the development web server:

./ runserver

Alternatively, you can start the backend analysis engine and the frontend web server in parallel:

scons run.all

From this point, you should be able to use the frontend on your machine at http://localhost:8000.

The start page should have a Developer Login link right below the OAuth login logos, which works without Internet connectivity. The OAuth login logos are broken by default, since you need OAuth2 credentials to be configured for that.

If your working on a staging machine, a valid option is to get an OpenID from somewhere such as

Prepare and run a production machine from a checkout

scons frontend backend
scons package
ansible-playbook -i ansible/inventories/localhost -e release_version=0.X.X ansible/prod_fe.yml
ansible-playbook -i ansible/inventories/localhost -e release_version=0.X.X ansible/prod_be.yml

We store our private credentials (OAuth keys etc.) for the installation in an Ansible vault. If you do the same, don't forget to add the --ask-vault-pass option to the line above.


FuzzEd ist licensed under the GNU AGPL Version 3. This means your are allowed to:

  • Install and run the unmodified FuzzEd code at your site.
  • Re-package and distribute the unmodified version of FuzzEd from this repository.
  • Fork and re-publish the editor, as long as your modified sources are accessible for everybody.

In short, AGPL forbids you to distribute or run your own modified version of FuzzEd without publishing your code.


People who contributed to this project so far:

  • Franz Becker (analysis)
  • Markus Götz (core architecture, frontend)
  • Lena Herscheid (analysis, simulation)
  • Felix Kubicek (frontend)
  • Stefan Richter (frontend)
  • Frank Schlegel (core architecture, frontend)
  • Christian Werling (frontend)