Open samuelwenker opened 1 year ago
I currently have a simple fuzzer written for the c2pa-rs project. I haven't published it yet because I am still conducting some experiments. Although, that fuzzer is also specific to the c2pa-rs SDK. Since the c2pa-rs library won't be used by everyone within the c2pa community, there is also a need for a more generalized approach to fuzzing C2PA implementations.
My current plan is to publish guidance and some supporting files within this project for taking an existing open-source fuzzer and applying it to generic C2PA implementations. This would have the following advantages:
Although, I am open to discussion if you have additional ideas on how to support people seeking to do binary fuzzing.
Both JUMBF and CBOR have numerous binary formatting requirements that could result in buffer overruns if malicious values are set and a memory-unsafe parser is used without appropriate checks.
A couple very simple examples:
As such, attack manifests that have malicious values for these types of things should be included in any security test suite.