-
Given our troubles with CI on Microsoft/ChakraCore, we can try to set up CI on the clone of CC code we have in this org. This would need to be done at some point anyway to migrate the repo here.
Th…
-
@chenju2k6 @jonathanmetzman @Alan32Liu
In #1827 the experiment reports only `NaN` for a variety of different fuzzers, with a specific bias towards `Symsan` and my tool.
I was able to reproduce th…
-
Currently, `go test` only allows fuzzing one target per package. So if package `example.com/a` has targets `Fuzz1` and `Fuzz2`, this command fails:
```
$ go test -fuzz=. example.com/a
ok exampl…
-
- what are the bugs that esbmc can verify? what kinds of bugs cannot
-
### Your environment.
- Version: 2.0.9
- Browser: N/A
- Other Information - OS: Ubuntu 20
### What did you do?
Test how the PionDTLS client behaves when asked to authenticate with a certi…
-
### Security issue notifications
If you discover a potential security issue in s2n we ask that you notify
AWS Security via our [vulnerability reporting page](http://aws.amazon.com/security/vulnera…
-
For the last few days every Debug starts with a row of four ones.
1
1
1
1
Otherwise, it's working fine. Just thinking people new to the app might be put off.
Thanks
-
Hi,
I am still working on my fuzz testing using [fuzzinator](https://github.com/renatahodovan/fuzzinator) framework and the [grammarinator](https://github.com/renatahodovan/grammarinator) test genera…
-
-
> It already outperforms many well-known coverage-guided fuzzers in Google's fuzzbench[^1] benchmark, including honggfuzz, libfuzzer/entropic, as well as old-skool afl. On top, LibAFL[^2] scales bette…