-
simdjson seems to be the gold standard in terms of JSON-parsing performance. It's always being updated with state-of-the-art algorithms for parsing, makes excellent use of intrinsics, and supports bot…
-
LibAFL is starting to become very feature-full, and will probably continue to grow in this regard.
It would be extremely useful to have a flowchart or decision tree which helps guide users in choos…
s1341 updated
7 months ago
-
### Description
Hello!
I have a POST request and I need to use
-
Hi, I am new to magma, and I want to use magma to test my own fuzzer. After successfully setting up the environment(build.sh && start.sh can run poperly) and 24 hours' fuzz testing, I got nothing unde…
-
This is a tracking issue for the [student project](https://github.com/servo/servo/wiki/Random-web-content-project) to create a fuzzer for random web content. Besides stress-testing Servo's implementat…
-
Currently cargo-fuzz imports the fuzz target crate using `extern crate`. This exposes only public interfaces.
Is there a way to fuzz internal (`pub(crate)`) APIs?
dbrgn updated
9 months ago
-
In https://github.com/phetsims/axon/issues/332 we removed the guard from createObservableArray removal methods. I added a sim-specific guard in the following commit, but I'm not sure if it should be …
-
I wonder if [Csmith](https://embed.cs.utah.edu/csmith/) would be useful for generating random input programs for fuzzing xlscc. It might need to be augmented with a wrapper which does I/O and feeds Cs…
-
I'm not sure how exactly FI is supposed to be used but it seems to me that in general building at least two reports and comparing them would be a reliable way to figure out whether anything has been i…
-
If I feed arbitrary and potentially malicious bytes to `postcard::from_bytes()`, my expectation is that the deserialization fails with an error result, as opposed to an undesirable behavior such as (1…