Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[FEATURE] OSS-FUZZ Integration #388

Open
TheCrott opened this issue Jul 3, 2020 · 1 comment
Open

[FEATURE] OSS-FUZZ Integration #388

TheCrott opened this issue Jul 3, 2020 · 1 comment

Comments

@TheCrott
Copy link

TheCrott commented Jul 3, 2020

Hi @gunnsth

I want to offer free fuzzing integration with Google fuzzing service, OSS-Fuzz. OSS-Fuzz is a free fuzzing infrastructure you can use to identify security vulnerabilities and stability bugs in your project. OSS-Fuzz will:

  • Continuously run at scale all the fuzzers you write.
  • Alert you when it finds issues.
  • Automatically close issues after they’ve been fixed by a commit.

Many widely used open source projects like OpenSSL, FFmpeg, LibreOffice, and ImageMagick are fuzzing via OSS-Fuzz, which helps them find and remediate critical issues.

This is a free offer from Google to make opensource library more secure. The interesting part is Google have a reward program upto $20k for successful integration.

Means we can get money after integration is done.
I can help you write fuzzing harness and provide more corpus or seed data.

Thanks!

@github-actions
Copy link

github-actions bot commented Jul 3, 2020

Welcome! Thanks for posting your first issue. The way things work here is that while customer issues are prioritized, other issues go into our backlog where they are assessed and fitted into the roadmap when suitable. If you need to get this done, consider buying a license which also enables you to use it in your commercial products. More information can be found on https://unidoc.io/

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant