Kitxuuu commited on
Commit
11276f1
·
verified ·
1 Parent(s): 3085fca

Add files using upload-large-folder tool

Browse files
Files changed (20) hide show
  1. local-test-tika-full-01-vuln_6/fuzz-tooling/docs/_sass/color_schemes/wider.scss +2 -0
  2. local-test-tika-full-01-vuln_6/fuzz-tooling/docs/advanced-topics/advanced_topics.md +9 -0
  3. local-test-tika-full-01-vuln_6/fuzz-tooling/docs/advanced-topics/bug_fixing_guidance.md +94 -0
  4. local-test-tika-full-01-vuln_6/fuzz-tooling/docs/advanced-topics/code_coverage.md +130 -0
  5. local-test-tika-full-01-vuln_6/fuzz-tooling/docs/advanced-topics/reproducing.md +160 -0
  6. local-test-tika-full-01-vuln_6/fuzz-tooling/docs/further-reading/clusterfuzz.md +67 -0
  7. local-test-tika-full-01-vuln_6/fuzz-tooling/docs/further-reading/further_reading.md +9 -0
  8. local-test-tika-full-01-vuln_6/fuzz-tooling/docs/further-reading/fuzzer_environment.md +77 -0
  9. local-test-tika-full-01-vuln_6/fuzz-tooling/docs/getting-started/integration_rewards.md +15 -0
  10. local-test-tika-full-01-vuln_6/fuzz-tooling/docs/reference/glossary.md +99 -0
  11. local-test-tika-full-01-vuln_6/fuzz-tooling/docs/reference/useful_links.md +51 -0
  12. local-test-tika-full-01-vuln_6/fuzz-tooling/docs/research/target_generation.md +1716 -0
  13. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder-fuzzbench/fuzzbench_install_dependencies +22 -0
  14. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder-swift/precompile_swift +33 -0
  15. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/filestore/filesystem/__init__.py +107 -0
  16. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/example_crash_fuzzer_bug_summary.txt +68 -0
  17. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/external-project/my_api.h +19 -0
  18. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/tools/wycheproof/.gitignore +1 -0
  19. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/tools/wycheproof/generate_job.py +50 -0
  20. local-test-tika-full-01-vuln_6/fuzz-tooling/infra/tools/wycheproof/package.bash +18 -0
local-test-tika-full-01-vuln_6/fuzz-tooling/docs/_sass/color_schemes/wider.scss ADDED
@@ -0,0 +1,2 @@
 
 
 
1
+ @import "./color_schemes/light";
2
+ $content-width: 70rem;
local-test-tika-full-01-vuln_6/fuzz-tooling/docs/advanced-topics/advanced_topics.md ADDED
@@ -0,0 +1,9 @@
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ layout: default
3
+ title: Advanced topics
4
+ has_children: true
5
+ nav_order: 3
6
+ permalink: /advanced-topics/
7
+ ---
8
+
9
+ # Advanced topics
local-test-tika-full-01-vuln_6/fuzz-tooling/docs/advanced-topics/bug_fixing_guidance.md ADDED
@@ -0,0 +1,94 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ layout: default
3
+ title: Bug fixing guidance
4
+ nav_order: 6
5
+ permalink: /advanced-topics/bug-fixing-guidance
6
+ ---
7
+
8
+ # Bug fixing guidance
9
+ {: .no_toc}
10
+
11
+ This page provides brief guidance on how to prioritise and fix bugs reported by
12
+ OSS-Fuzz.
13
+
14
+ - TOC
15
+ {:toc}
16
+
17
+ ## Threat modelling
18
+ In general the severity of an issue reported by OSS-Fuzz must be determined
19
+ relative to the threat model of the project under analysis. Therefore, although
20
+ the fuzzers OSS-Fuzz makes an effort into determining the severity of the bug
21
+ the true severity of the bug depends on the threat model of the project.
22
+
23
+ ## Bug prioritisation
24
+
25
+ ### Security issues
26
+ These are the top priority of solving. A label is attached to these on
27
+ the OSS-Fuzz testcase page and you can also search up all of these on monorail
28
+ using the search pattern `-Bug=security`.
29
+
30
+ Issues of this kind include issues reported by Address Sanitizer, e.g.
31
+ heap-based buffer overflows, stack-based buffer overflows and use-after-frees.
32
+
33
+ ### Functional issues and memory leaks
34
+ These are issues that in general can tamper with the functionality of the
35
+ application. The bugs that have highest priority in this case are those that
36
+ can be easily triggered by an untrusted user of the project.
37
+
38
+ ### Timeouts and out-of-memory
39
+ These are in general the least prioritised issues to solve.
40
+
41
+ ### Bug prioritisation of non C/C++ projects
42
+ Currently there is no prioritisation of bugs in non C/C++ projects. As such, in
43
+ this scenario it is crucial you do the analysis yourself relative to the threat
44
+ model of your project.
45
+
46
+ ## Non-reproducible bugs
47
+ OSS-Fuzz will report some bugs that are labeled `Reliably reproduces: NO` and
48
+ these can be tricky to deal with. A non-reproducible bug is an issue that
49
+ OSS-Fuzz did indeed discover, however, OSS-Fuzz is unable to reproduce the bug
50
+ with `python infra/helper.py reproduce`. In general, our suggestion is to do
51
+ analysis of the bug and determine whether there in fact is an issue.
52
+
53
+ The non-reproducible bugs can be of varying nature. Some of these bugs will be
54
+ due to some internal state of the target application being manipulated over the
55
+ cause of several executions of the fuzzer function. This could be several
56
+ hundreds or even thousands of executions and the bug may not be reproducible by
57
+ a single fuzzer test-case, however, there is indeed a bug in the application.
58
+ There are other reasons why bugs may be non-reproducible and in general any
59
+ non-determinism introduced into the application can have an effect on this.
60
+
61
+ In the case of non-reproducible bugs our advice is to put effort into analysing
62
+ the potential bug and also assess whether this is due to some internal state
63
+ that persists between each fuzz run. If that is indeed the case then we also
64
+ suggest investigating whether the fuzzer can be written such that the internal
65
+ state in the code will be reset between each fuzz run.
66
+
67
+ ## Should all reported issues be solved?
68
+ It is reported by some project maintainers that fixing timeout issues reported
69
+ by OSS-Fuzz can increase the complexity of the project’s source code. The
70
+ result of this is that maintainers put effort into solving a timeout issue and
71
+ the fix results in additional complexity of the project. The question is
72
+ whether in a scenario like this if the overall result actually improves the
73
+ state of the application.
74
+
75
+ In order to answer this question we must assess the issue relative to the
76
+ threat model. Following the timeout anecdote then some timing issues can have
77
+ severe security implications. For example, if the timeout issue can cause
78
+ manipulation of control-flow then the timing issue may be of high security
79
+ severity. As such, it is difficult to say in the general case whether or not
80
+ some bugs should not be solved, as it should be analysed and determined on a
81
+ project-by-project basis.
82
+
83
+ In the event that a bug is reported by OSS-Fuzz that is not relevant to
84
+ security or reliability of the application then there may still be a point to
85
+ fixing the bug. For example, if the issue is often run into by the fuzzer then
86
+ the fuzzer may have difficulty exploring further code in the target, and thus
87
+ fixing the bug will allow the fuzzer to explore further code. In this case some
88
+ suggested examples of resolving the issue could be:
89
+ * Perform a hot-patch that is only applied during fuzzer executions and does
90
+ not overcomplicate the project’s code.
91
+ * Patch the code of the fuzzer to avoid the timeout. For example, some fuzzers
92
+ restrict the size of the input to avoid certain deep recursions or
93
+ time-intensive loops.
94
+ * Patch the code in the target despite complicating things.
local-test-tika-full-01-vuln_6/fuzz-tooling/docs/advanced-topics/code_coverage.md ADDED
@@ -0,0 +1,130 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ layout: default
3
+ title: Code coverage
4
+ parent: Advanced topics
5
+ nav_order: 2
6
+ permalink: /advanced-topics/code-coverage/
7
+ ---
8
+
9
+ # Code Coverage
10
+ {: .no_toc}
11
+
12
+ For projects written in C/C++, Rust, Go, Swift or Java and other JVM-based languages,
13
+ you can generate code coverage reports using Clang source-based code coverage.
14
+ This page walks you through the basic steps.
15
+ For more details on C/C++ coverage, see [Clang's documentation].
16
+
17
+ Code coverage reports generation for other languages is not supported yet.
18
+
19
+ - TOC
20
+ {:toc}
21
+ ---
22
+
23
+ ## Pull the latest Docker images
24
+
25
+ Docker images get regularly updated with a newer version of build tools, build
26
+ configurations, scripts, and other changes. We recommend you pull the most
27
+ recent images by running the following command:
28
+
29
+ ```bash
30
+ $ python infra/helper.py pull_images
31
+ ```
32
+
33
+ ## Build fuzz targets
34
+
35
+ Code coverage report generation requires a special build configuration to be
36
+ used. To create a code coverage build for your project, run these commands:
37
+
38
+ ```bash
39
+ $ python infra/helper.py build_image $PROJECT_NAME
40
+ $ python infra/helper.py build_fuzzers --sanitizer=coverage $PROJECT_NAME
41
+ ```
42
+
43
+ ## Establish access to GCS
44
+
45
+ To get a good understanding of fuzz testing quality, you should generate code
46
+ coverage reports by running fuzz targets against the corpus
47
+ aggregated by OSS-Fuzz. Set up `gsutil` and ensure that you have access to the
48
+ corpora by doing the following:
49
+
50
+ * Install the [gsutil tool].
51
+ * Check whether you have access to the corpus for your project:
52
+
53
+ ```bash
54
+ $ gsutil ls gs://${PROJECT_NAME}-corpus.clusterfuzz-external.appspot.com/
55
+ ```
56
+
57
+ If you see an authorization error from the command above, run this:
58
+
59
+ ```bash
60
+ $ gcloud auth login
61
+ ```
62
+
63
+ and try again. Once `gsutil` works, you can run the report generation.
64
+
65
+ ## Generate code coverage reports
66
+
67
+ ### Full project report
68
+
69
+ If you want to generate a code coverage report using the corpus aggregated on
70
+ OSS-Fuzz, run this command:
71
+
72
+ ```bash
73
+ $ python infra/helper.py coverage $PROJECT_NAME
74
+ ```
75
+
76
+ If you want to generate a code coverage report using the corpus you have
77
+ locally, copy the corpus into the
78
+ `build/corpus/$PROJECT_NAME/<fuzz_target_name>/` directories for each fuzz
79
+ target, then run this command:
80
+
81
+ ```bash
82
+ $ python infra/helper.py coverage --no-corpus-download $PROJECT_NAME
83
+ ```
84
+
85
+ ### Single fuzz target
86
+
87
+ You can generate a code coverage report for a particular fuzz target by using
88
+ the `--fuzz-target` argument:
89
+
90
+ ```bash
91
+ $ python infra/helper.py coverage --fuzz-target=<fuzz_target_name> $PROJECT_NAME
92
+ ```
93
+
94
+ In this mode, you can specify an arbitrary corpus location for the fuzz target
95
+ (instead of the corpus downloaded from OSS-Fuzz) by using `--corpus-dir`:
96
+
97
+ ```bash
98
+ $ python infra/helper.py coverage --fuzz-target=<fuzz_target_name> \
99
+ --corpus-dir=<my_local_corpus_dir> $PROJECT_NAME
100
+ ```
101
+
102
+ ### Additional arguments for `llvm-cov` (C/C++/Rust only)
103
+
104
+ You may want to use some of the options provided by the [llvm-cov tool], like
105
+ `-ignore-filename-regex=`. You can pass these to the helper script after `--`:
106
+
107
+ ```bash
108
+ $ python infra/helper.py coverage $PROJECT_NAME -- \
109
+ -ignore-filename-regex=.*code/to/be/ignored/.* <other_extra_args>
110
+ ```
111
+
112
+ If you want to specify particular source files or directories to show in the
113
+ report, list their paths at the end of the extra arguments sequence:
114
+
115
+ ```bash
116
+ $ python infra/helper.py coverage zlib -- \
117
+ <other_extra_args> /src/zlib/inftrees.c /src/zlib_uncompress_fuzzer.cc /src/zlib/zutil.c
118
+ ```
119
+
120
+ If you want OSS-Fuzz to use extra arguments when generating code coverage
121
+ reports for your project, add the arguments into your `project.yaml` file as
122
+ follows:
123
+
124
+ ```yaml
125
+ coverage_extra_args: -ignore-filename-regex=.*crc.* -ignore-filename-regex=.*adler.* <other_extra_args>
126
+ ```
127
+
128
+ [Clang's documentation]: https://clang.llvm.org/docs/SourceBasedCodeCoverage.html
129
+ [gsutil tool]: https://cloud.google.com/storage/docs/gsutil_install
130
+ [llvm-cov tool]: https://llvm.org/docs/CommandGuide/llvm-cov.html
local-test-tika-full-01-vuln_6/fuzz-tooling/docs/advanced-topics/reproducing.md ADDED
@@ -0,0 +1,160 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ layout: default
3
+ title: Reproducing
4
+ parent: Advanced topics
5
+ nav_order: 5
6
+ permalink: /advanced-topics/reproducing/
7
+ ---
8
+
9
+ # Reproducing OSS-Fuzz issues
10
+ {: .no_toc}
11
+
12
+ You've been CCed on an OSS-Fuzz issue
13
+ ([examples](https://bugs.chromium.org/p/oss-fuzz/issues/list?can=1&q=Type%3ABug%2CBug-Security)).
14
+ Now what? Before attempting to fix the bug, you should be able to reliably
15
+ reproduce it.
16
+
17
+ - TOC
18
+ {:toc}
19
+ ---
20
+
21
+ ## Fuzz target bugs
22
+
23
+ Every issue has a [reproducer file]({{ site.baseurl
24
+ }}/reference/glossary/#reproducer) (also know as a "testcase" file) attached.
25
+ Download it. This file contains the bytes that were fed to the [fuzz
26
+ target](https://llvm.org/docs/LibFuzzer.html#fuzz-target).
27
+
28
+ **Note:** If the issue is not public, you will need to login using a
29
+ [Google account](https://support.google.com/accounts/answer/176347?hl=en)
30
+ ([why?]({{ site.baseurl
31
+ }}/faq/#why-do-you-require-a-google-account-for-authentication)) that the bug
32
+ report CCs.
33
+
34
+ If you have already
35
+ [integrated]({{ site.baseurl }}/advanced-topics/ideal-integration/)
36
+ the fuzz target with your build and test system, all you have to do is run this command:
37
+ ```bash
38
+ $ ./fuzz_target_binary <testcase_path>
39
+ ```
40
+
41
+ For timeout bugs, add the `-timeout=65` argument. For OOM bugs, add the
42
+ `-rss_limit_mb=2560` argument. Read more on [how timeouts and OOMs are
43
+ handled]({{ site.baseurl }}/faq/#how-do-you-handle-timeouts-and-ooms).
44
+
45
+ Depending on the nature of the bug, the fuzz target binary needs to be built
46
+ with the appropriate [sanitizer](https://github.com/google/sanitizers)
47
+ (for example, if it's a buffer overflow, build with
48
+ [AddressSanitizer](http://clang.llvm.org/docs/AddressSanitizer.html)).
49
+
50
+ If you're not sure how to build the fuzzer using the project's build system,
51
+ you can also use Docker commands to replicate the exact build steps used by
52
+ OSS-Fuzz, then feed the reproducer input to the fuzz target ([how?]({{
53
+ site.baseurl }}/getting-started/new-project-guide/#prerequisites), [why?]({{
54
+ site.baseurl }}/faq/#why-do-you-use-docker)).
55
+
56
+ ## Building using Docker
57
+
58
+ ### Cloning OSS-Fuzz
59
+
60
+ To use the following `infra/helper.py` commands, you need a checkout of OSS-Fuzz:
61
+
62
+ ```bash
63
+ $ git clone --depth=1 https://github.com/google/oss-fuzz.git
64
+ $ cd oss-fuzz
65
+ ```
66
+
67
+ ### Pull the latest Docker images
68
+
69
+ Docker images get regularly updated with a newer version of build tools, build
70
+ configurations, scripts, and other changes. In some cases, a particular issue
71
+ can be reproduced only with a fresh image being used. Pull the latest images
72
+ by running the following command:
73
+
74
+ ```bash
75
+ $ python infra/helper.py pull_images
76
+ ```
77
+
78
+ ### Build the image and the fuzzers
79
+
80
+ Run the following commands:
81
+
82
+ ```bash
83
+ $ python infra/helper.py build_image $PROJECT_NAME
84
+ $ python infra/helper.py build_fuzzers --sanitizer <address/memory/undefined> \
85
+ --architecture <x86_64/i386> $PROJECT_NAME
86
+ ```
87
+
88
+ The `sanitizer` used in the report is the value in the
89
+ **Sanitizer** column. It's one of the following:
90
+ * **address** for AddressSanitizer.
91
+ * **memory** for MemorySanitizer.
92
+ * **undefined** for UndefinedBehaviorSanitizer.
93
+
94
+ **Notes**:
95
+ * The `architecture` argument is only necessary if you want to specify
96
+ `i386` configuration.
97
+ * Some bugs (specially ones related to pointer and integer overflows) are reproducible only in 32 bit mode or only in 64 bit mode.
98
+ If you can't reproduce a particular bug building for x86_64, try building for i386.
99
+
100
+ ## Reproducing bugs
101
+
102
+ After you build an image and a fuzzer, you can reproduce a bug by running the following command:
103
+
104
+ ```bash
105
+ $ python infra/helper.py reproduce $PROJECT_NAME <fuzz_target_name> <testcase_path>
106
+ ```
107
+
108
+ For example, to build the [libxml2](https://github.com/google/oss-fuzz/tree/master/projects/libxml2)
109
+ project with UndefinedBehaviorSanitizer (`undefined`) instrumentation and
110
+ reproduce a crash testcase for a fuzzer named `libxml2_xml_read_memory_fuzzer`,
111
+ you would run:
112
+
113
+ ```bash
114
+ $ python infra/helper.py build_image libxml2
115
+ $ python infra/helper.py build_fuzzers --sanitizer undefined libxml2
116
+ $ python infra/helper.py reproduce libxml2 libxml2_xml_read_memory_fuzzer ~/Downloads/testcase
117
+ ```
118
+
119
+ ## Reproduce using local source checkout
120
+
121
+ You can also mount local sources into the running container by using these commands:
122
+
123
+ ```bash
124
+ $ python infra/helper.py build_fuzzers \
125
+ --sanitizer <address/memory/undefined> $PROJECT_NAME <source_path>
126
+ $ python infra/helper.py reproduce $PROJECT_NAME <fuzz_target_name> <testcase_path>
127
+ ```
128
+
129
+ Once you reproduce the bug, you can do the following:
130
+
131
+ - **Fix issue:** Write a patch to fix the issue in your local checkout, then
132
+ use the previous command to verify the fix (i.e. no crash occurred).
133
+ [Use gdb]({{ site.baseurl }}/advanced-topics/debugging/#debugging-fuzzers-with-gdb)
134
+ if needed.
135
+ - **Submit fix:** Submit the fix in the project's repository. ClusterFuzz will
136
+ automatically pick up the changes, recheck the testcase, and close the
137
+ issue (in &lt; 1 day).
138
+ - **Improve fuzzing support:** Consider
139
+ [improving your integration with OSS-Fuzz]({{ site.baseurl }}/advanced-topics/ideal-integration/).
140
+
141
+ ## Reproducing build failures
142
+
143
+ Our infrastructure runs some sanity tests to make sure that your build was
144
+ correctly configured, even if it succeeded. To reproduce these locally, run these commands:
145
+
146
+ ```bash
147
+ $ python infra/helper.py build_image $PROJECT_NAME
148
+ $ python infra/helper.py build_fuzzers --sanitizer <address/memory/undefined> \
149
+ --engine <libfuzzer/afl/honggfuzz/centipede> --architecture <x86_64/i386> $PROJECT_NAME
150
+ $ python infra/helper.py check_build --sanitizer <address/memory/undefined> \
151
+ --engine <libfuzzer/afl/honggfuzz/centipede> --architecture <x86_64/i386> $PROJECT_NAME \
152
+ <fuzz_target_name>
153
+ ```
154
+
155
+ **Note:** Unless you have a reason to think the build is an `i386` build, the build
156
+ is probably an `x86_64` build and the `architecture` argument can be omitted.
157
+
158
+ If you need to reproduce a `coverage` build failure, follow the
159
+ [Code Coverage page]({{ site.baseurl }}/advanced-topics/code-coverage) to build
160
+ your project and generate a code coverage report.
local-test-tika-full-01-vuln_6/fuzz-tooling/docs/further-reading/clusterfuzz.md ADDED
@@ -0,0 +1,67 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ layout: default
3
+ title: ClusterFuzz
4
+ parent: Further reading
5
+ nav_order: 1
6
+ permalink: /further-reading/clusterfuzz/
7
+ ---
8
+
9
+ # ClusterFuzz
10
+
11
+ [ClusterFuzz](https://github.com/google/clusterfuzz) is the distributed fuzzing
12
+ infrastructure behind OSS-Fuzz. It was initially built for fuzzing Chrome at
13
+ scale.
14
+
15
+ - TOC
16
+ {:toc}
17
+ ---
18
+
19
+ ## Web interface
20
+
21
+ ClusterFuzz provides a [web interface](https://oss-fuzz.com)
22
+ to view statistics about your fuzz targets, as well as current crashes.
23
+
24
+ *Note*: Access is restricted to project developers who we auto CC on new bug
25
+ reports.
26
+
27
+ ## Testcase reports
28
+
29
+ ClusterFuzz will automatically de-duplicate and file reproducible crashes into
30
+ our [bug tracker](https://bugs.chromium.org/p/oss-fuzz/issues/list). We provide
31
+ a crash report page that gives you the stack trace, a link to the crashing
32
+ testcase, and regression ranges where the bug was most likely introduced.
33
+
34
+ ![report]({{ site.baseurl }}/images/pcre2_testcase.png?raw=true)
35
+
36
+ ## Fuzzer stats
37
+
38
+ You can view statistics about your fuzz targets (e.g. speed, coverage
39
+ information, memory usage) on our fuzzer statistics dashboard.
40
+
41
+ ![stats]({{ site.baseurl }}/images/freetype_stats_graphs.png?raw=true)
42
+
43
+ ![stats]({{ site.baseurl }}/images/freetype_stats_table.png?raw=true)
44
+
45
+ ## Coverage reports
46
+
47
+ We provide coverage reports, where we highlight the parts of source code that
48
+ are being reached by your fuzz target. Make sure to look at the uncovered code
49
+ marked in red and add appropriate fuzz targets to cover those use cases.
50
+
51
+ ![coverage_1]({{ site.baseurl }}/images/freetype_coverage_1.png?raw=true)
52
+ ![coverage_2]({{ site.baseurl }}/images/freetype_coverage_2.png?raw=true)
53
+
54
+ ## Performance analyzer
55
+
56
+ You can view performance issues that your fuzz target is running into (e.g.
57
+ leaks, timeouts, etc) by clicking on `Performance` link on our fuzzer statistics
58
+ dashboard. Make sure to fix all cited issues, so as to keep your fuzz target
59
+ running efficiently and finding new bugs.
60
+
61
+ ![performance_analyzer]({{ site.baseurl }}/images/expat_performance_analyzer.png?raw=true)
62
+
63
+ ## Crash stats
64
+
65
+ You can view statistics of crashes over time on our crash statistics dashboard.
66
+
67
+ ![crash_stats]({{ site.baseurl }}/images/crash_stats.png?raw=true)
local-test-tika-full-01-vuln_6/fuzz-tooling/docs/further-reading/further_reading.md ADDED
@@ -0,0 +1,9 @@
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ layout: default
3
+ title: Further reading
4
+ has_children: true
5
+ nav_order: 4
6
+ permalink: /further-reading/
7
+ ---
8
+
9
+ # Further reading
local-test-tika-full-01-vuln_6/fuzz-tooling/docs/further-reading/fuzzer_environment.md ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ layout: default
3
+ title: Fuzzer environment
4
+ parent: Further reading
5
+ nav_order: 2
6
+ permalink: /further-reading/fuzzer-environment/
7
+ ---
8
+
9
+ # Fuzzer environment on ClusterFuzz
10
+
11
+ Your fuzz targets will be run on a
12
+ [Google Compute Engine](https://cloud.google.com/compute/) VM (Linux).
13
+
14
+ - TOC
15
+ {:toc}
16
+ ---
17
+
18
+ ## Runtime Dependencies
19
+
20
+ You should not make any assumptions on the availability of dependent packages
21
+ in the execution environment. Packages that are installed via
22
+ [Dockerfile]({{ site.baseurl }}/getting-started/new-project-guide/#dockerfile)
23
+ or built as part of
24
+ [build.sh]({{ site.baseurl }}/getting-started/new-project-guide/#buildsh)
25
+ are not available on the bot runtime environment (where the fuzz targets run).
26
+
27
+ If you need these dependencies in the runtime environment, you can either:
28
+ - Install the packages via Dockerfile
29
+ ([example](https://github.com/google/oss-fuzz/blob/2d5e2ef84f281e6ab789055aa735606d3122fda9/projects/tor/Dockerfile#L19))
30
+ and then link statically against them
31
+ ([example](https://github.com/google/oss-fuzz/blob/2d5e2ef84f281e6ab789055aa735606d3122fda9/projects/tor/build.sh#L40)).
32
+ - Or build the dependencies statically in
33
+ [build.sh]({{ site.baseurl }}/getting-started/new-project-guide/#buildsh)
34
+ ([example](https://github.com/google/oss-fuzz/blob/64f8b6593da141b97c98c7bc6f07df92c42ee010/projects/ffmpeg/build.sh#L26)).
35
+
36
+ All build artifacts needed during fuzz target execution should be inside the
37
+ `$OUT` directory. Only those artifacts are archived and used on the bots.
38
+ Everything else is ignored (e.g. artifacts in `$WORK`, `$SRC`, etc) and hence
39
+ is not available in the execution environment.
40
+
41
+ We strongly recommend static linking because it just works.
42
+ However dynamic linking can work if shared objects are included in the `$OUT` directory and are loaded relative
43
+ to `'$ORIGIN'`, the path of the binary (see the discussion of `'$ORIGIN'` [here](http://man7.org/linux/man-pages/man8/ld.so.8.html)).
44
+ A fuzzer can be instructed to load libraries relative to `'$ORIGIN'` during compilation (i.e. `-Wl,-rpath,'$ORIGIN/lib'` )
45
+ or afterwards using `chrpath -r '$ORIGIN/lib' $OUT/$fuzzerName` ([example](https://github.com/google/oss-fuzz/blob/09aa9ac556f97bd4e31928747eca0c8fed42509f/projects/php/build.sh#L40)). Note that `'$ORIGIN'` should be surrounded
46
+ by single quotes because it is not an environment variable like `$OUT` that can be retrieved during execution of `build.sh`.
47
+ Its value is retrieved during execution of the binary. You can verify that you did this correctly using `ldd <fuzz_target_name>` and the `check_build` command in `infra/helper.py`.
48
+
49
+ You should ensure that the fuzz target works correctly by using `run_fuzzer`
50
+ command (see instructions
51
+ [here]({{ site.baseurl }}/getting-started/new-project-guide/#testing-locally)).
52
+ This command uses a clean base-runner docker container and not the base-builder
53
+ docker container created during build-time.
54
+
55
+ ## argv[0]
56
+
57
+ You must not modify `argv[0]`. It is required for certain things to work
58
+ correctly.
59
+
60
+ ## Current working directory
61
+
62
+ You should not make any assumptions about the current working directory of your
63
+ fuzz target. If you need to load data files, please use `argv[0]` to get the
64
+ directory where your fuzz target executable is located.
65
+
66
+ ## File system
67
+
68
+ Everything except `/tmp` is read-only, including the directory that your fuzz
69
+ target executable lives in.
70
+
71
+ `/dev` is also unavailable.
72
+
73
+ ## Hardware
74
+
75
+ Your project should not be compiled with `-march=native` or `-mtune=native`
76
+ flags, as the build infrastructure and fuzzing machines may have different CPUs
77
+ as well as other hardware differences. You may however use `-mtune=generic`.
local-test-tika-full-01-vuln_6/fuzz-tooling/docs/getting-started/integration_rewards.md ADDED
@@ -0,0 +1,15 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ layout: default
3
+ title: Integration rewards
4
+ parent: Getting started
5
+ nav_order: 3
6
+ permalink: /getting-started/integration-rewards/
7
+ ---
8
+
9
+ # Integration rewards
10
+
11
+ We encourage you to apply for integration rewards (up to **$30,000**) once your project
12
+ is successfully integrated with OSS-Fuzz. Please see the full details
13
+ [here](https://bughunters.google.com/about/rules/5097259337383936/oss-fuzz-reward-program-rules).
14
+
15
+ To submit your application for a reward, please fill out [this form](https://goo.gle/oss-fuzz-submission).
local-test-tika-full-01-vuln_6/fuzz-tooling/docs/reference/glossary.md ADDED
@@ -0,0 +1,99 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ layout: default
3
+ title: Glossary
4
+ nav_order: 1
5
+ permalink: /reference/glossary/
6
+ parent: Reference
7
+ ---
8
+
9
+ # Glossary
10
+
11
+ For general fuzzing terms, see the [glossary] from [google/fuzzing] project.
12
+
13
+ [glossary]: https://github.com/google/fuzzing/blob/master/docs/glossary.md
14
+ [google/fuzzing]: https://github.com/google/fuzzing
15
+
16
+ - TOC
17
+ {:toc}
18
+ ---
19
+
20
+ ## OSS-Fuzz specific terms
21
+
22
+ ### ClusterFuzz
23
+
24
+ A scalable fuzzing infrastructure that is used for OSS-Fuzz backend.
25
+ [ClusterFuzz] is also used to fuzz Chrome and many other projects. A quick
26
+ overview of ClusterFuzz user interface is available on this [page].
27
+
28
+ [page]: {{ site.baseurl }}/further-reading/clusterfuzz
29
+ [ClusterFuzz]: https://github.com/google/clusterfuzz
30
+
31
+ ### Fuzz Target
32
+
33
+ In addition to its
34
+ [general definition](https://github.com/google/fuzzing/blob/master/docs/glossary.md#fuzz-target),
35
+ in OSS-Fuzz a fuzz target can be used to
36
+ [reproduce bug reports]({{ site.baseurl }}/advanced-topics/reproducing/).
37
+ It is recommended to use it for regression testing as well (see
38
+ [ideal integration]({{ site.baseurl }}/advanced-topics/ideal-integration/)).
39
+
40
+ ### Job type
41
+
42
+ Or **Fuzzer Build**.
43
+
44
+ This refers to a build that contains all the [fuzz targets] for a given
45
+ [project](#project), is run with a specific [fuzzing engine], in a specific
46
+ build mode (e.g. with enabled/disabled assertions), and optionally combined
47
+ with a [sanitizer].
48
+
49
+ For example, we have a "libfuzzer_asan_sqlite" job type, indicating a build of
50
+ all sqlite3 [fuzz targets] using [libFuzzer](http://libfuzzer.info) and
51
+ [ASan](http://clang.llvm.org/docs/AddressSanitizer.html).
52
+
53
+ ### Project
54
+
55
+ A project is an open source software project that is integrated with OSS-Fuzz.
56
+ Each project has a single set of configuration files
57
+ (example: [expat](https://github.com/google/oss-fuzz/tree/master/projects/expat))
58
+ and may have one or more [fuzz targets]
59
+ (example: [openssl](https://github.com/openssl/openssl/blob/master/fuzz/)).
60
+
61
+ ### Reproducer
62
+
63
+ Or a **testcase**.
64
+
65
+ A [test input] that causes a specific bug to reproduce.
66
+
67
+ [fuzz targets]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#fuzz-target
68
+ [fuzzing engine]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#fuzzing-engine
69
+ [sanitizer]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#sanitizer
70
+ [test input]: https://github.com/google/fuzzing/blob/master/docs/glossary.md#test-input
71
+
72
+ ### Sanitizers
73
+
74
+ Fuzzers are usually built with one or more [sanitizer](https://github.com/google/sanitizers) enabled.
75
+
76
+ ```bash
77
+ $ python infra/helper.py build_fuzzers --sanitizer undefined json
78
+ ```
79
+
80
+ Supported sanitizers:
81
+
82
+ | Sanitizer | Description
83
+ | ------------ | ----------
84
+ | `address` *(default)* | [Address Sanitizer](https://github.com/google/sanitizers/wiki/AddressSanitizer) with [Leak Sanitizer](https://github.com/google/sanitizers/wiki/AddressSanitizerLeakSanitizer).
85
+ | `undefined` | [Undefined Behavior Sanitizer](http://clang.llvm.org/docs/UndefinedBehaviorSanitizer.html).
86
+ | `memory` | [Memory Sanitizer](https://github.com/google/sanitizers/wiki/MemorySanitizer).<br/>*NOTE: It is critical that you build __all__ the code in your program (including libraries it uses) with Memory Sanitizer. Otherwise, you will see false positive crashes due to an inability to see initializations in uninstrumented code.*
87
+ | `coverage` | Used for generating code coverage reports. See [Code Coverage doc]({{ site.baseurl }}/advanced-topics/code-coverage/).
88
+
89
+ Compiler flag values for predefined configurations are specified in the [Dockerfile](https://github.com/google/oss-fuzz/blob/master/infra/base-images/base-builder/Dockerfile).
90
+ These flags can be overridden by specifying `$SANITIZER_FLAGS` directly.
91
+
92
+ You can choose which configurations to automatically run your fuzzers with in `project.yaml` file (e.g. [sqlite3](https://github.com/google/oss-fuzz/tree/master/projects/sqlite3/project.yaml)).
93
+
94
+ ### Architectures
95
+ ClusterFuzz supports fuzzing on x86_64 (aka x64) by default. However you can also fuzz using AddressSanitizer and libFuzzer on i386 (aka x86, or 32 bit) by specifying the `$ARCHITECTURE` build environment variable using the `--architecture` option:
96
+
97
+ ```bash
98
+ python infra/helper.py build_fuzzers --architecture i386 json
99
+ ```
local-test-tika-full-01-vuln_6/fuzz-tooling/docs/reference/useful_links.md ADDED
@@ -0,0 +1,51 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ layout: default
3
+ title: Useful links
4
+ nav_order: 2
5
+ permalink: /reference/useful-links/
6
+ parent: Reference
7
+ ---
8
+
9
+ # Useful links
10
+
11
+ - TOC
12
+ {:toc}
13
+ ---
14
+
15
+ ## Web Interface
16
+
17
+ * The main page: [oss-fuzz.com](https://oss-fuzz.com)
18
+
19
+ ## Build Status
20
+
21
+ * [This page](https://oss-fuzz-build-logs.storage.googleapis.com/index.html)
22
+ gives the latest build logs for each project.
23
+
24
+ ## Blog posts
25
+
26
+ * 2016-12-01 - Announcing OSS-Fuzz: Continuous fuzzing for open source software
27
+ ([Open Source](https://opensource.googleblog.com/2016/12/announcing-oss-fuzz-continuous-fuzzing.html),
28
+ [Testing](https://testing.googleblog.com/2016/12/announcing-oss-fuzz-continuous-fuzzing.html),
29
+ [Security](https://security.googleblog.com/2016/12/announcing-oss-fuzz-continuous-fuzzing.html))
30
+ * 2017-05-08 - OSS-Fuzz: Five months later, and rewarding projects
31
+ ([Open Source](https://opensource.googleblog.com/2017/05/oss-fuzz-five-months-later-and.html),
32
+ [Testing](https://testing.googleblog.com/2017/05/oss-fuzz-five-months-later-and.html),
33
+ [Security](https://security.googleblog.com/2017/05/oss-fuzz-five-months-later-and.html))
34
+ * 2018-11-06 - A New Chapter for OSS-Fuzz
35
+ ([Security](https://security.googleblog.com/2018/11/a-new-chapter-for-oss-fuzz.html))
36
+ * 2020-10-09 - [Fuzzing internships for Open Source Software](https://security.googleblog.com/2020/10/fuzzing-internships-for-open-source.html)
37
+ * 2020-12-07 - [Improving open source security during the Google summer internship program](https://security.googleblog.com/2020/12/improving-open-source-security-during.html)
38
+ * 2021-03-10 - [Fuzzing Java in OSS-Fuzz](https://security.googleblog.com/2021/03/fuzzing-java-in-oss-fuzz.html)
39
+ * 2021-12-16 - [Improving OSS-Fuzz and Jazzer to catch Log4Shell](https://security.googleblog.com/2021/12/improving-oss-fuzz-and-jazzer-to-catch.html)
40
+ * 2022-09-08 - [Fuzzing beyond memory corruption: Finding broader classes of vulnerabilities automatically](https://security.googleblog.com/2022/09/fuzzing-beyond-memory-corruption.html)
41
+ * 2023-02-01 - [Taking the next step: OSS-Fuzz in 2023](https://security.googleblog.com/2023/02/taking-next-step-oss-fuzz-in-2023.html)
42
+
43
+ ## Tutorials
44
+
45
+ * [libFuzzer documentation](https://llvm.org/docs/LibFuzzer.html)
46
+ * [libFuzzer tutorial](https://github.com/google/fuzzing/blob/master/tutorial/libFuzzerTutorial.md)
47
+ * [libFuzzer workshop](https://github.com/Dor1s/libfuzzer-workshop)
48
+ * [Structure-Aware Fuzzing with libFuzzer](https://github.com/google/fuzzer-test-suite/blob/master/tutorial/structure-aware-fuzzing.md)
49
+ * [Chromium Fuzzing Page](https://chromium.googlesource.com/chromium/src/testing/libfuzzer/)
50
+ * [Chromium Efficient Fuzzing Guide](https://chromium.googlesource.com/chromium/src/testing/libfuzzer/+/HEAD/efficient_fuzzing.md)
51
+ * [ClusterFuzz documentation](https://google.github.io/clusterfuzz/)
local-test-tika-full-01-vuln_6/fuzz-tooling/docs/research/target_generation.md ADDED
@@ -0,0 +1,1716 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ layout: default
3
+ nav_exclude: true
4
+ permalink: /research/llms/target_generation/
5
+ ---
6
+ # Fuzz target generation using LLMs
7
+
8
+ [Read our announcement blog.](https://security.googleblog.com/2023/08/ai-powered-fuzzing-breaking-bug-hunting.html)
9
+
10
+ # Background
11
+
12
+ [OSS-Fuzz](http://github.com/google/oss-fuzz) performs continuous fuzzing of [1000+](https://github.com/google/oss-fuzz/tree/master/projects) open source projects across most major languages. To integrate a new project, a human typically analyzes the attack surface of a library and writes [fuzz targets](https://github.com/google/fuzzing/blob/master/docs/glossary.md#fuzz-target) (also called fuzzing harnesses) to exercise the relevant code. Linked with a [fuzzing engine](https://github.com/google/fuzzing/blob/master/docs/glossary.md#fuzzing-engine) (e.g. libFuzzer, AFL, Centipede), this enables coverage-guided fuzzing for all OSS-Fuzz projects. Depending on the complexity of the project, writing fuzz targets typically requires several hours of manual work and sufficient background knowledge of the project.
13
+
14
+ Additionally, the main challenge for most integrated OSS-Fuzz projects is ensuring high code coverage. Most OSS-Fuzz projects have fairly low runtime coverage ([~30%](http://introspector.oss-fuzz.com/)) despite millions of hours of CPU time. This means we are not finding vulnerabilities in approximately 70% of each project that we’re fuzzing. Our [preliminary research](https://dl.acm.org/doi/abs/10.1145/3605157.3605177) found that many[ fuzz blockers](https://github.com/ossf/fuzz-introspector/blob/main/doc/Glossary.md#fuzz-blockers) (as determined by [FuzzIntrospector](https://introspector.oss-fuzz.com/)) are because of deficiencies in existing targets, rather than deficiencies in fuzzing engines.
15
+
16
+ Generating fuzz targets via LLMs can reduce the manual effort required to more thoroughly fuzz existing projects in OSS-Fuzz as well as integrating new projects into OSS-Fuzz.
17
+
18
+
19
+ # Goals
20
+
21
+ Our ideal end state of this research is to use LLMs for two use cases:
22
+
23
+ 1. Completely automatic fuzz target generation (or modification of existing targets) for existing OSS-Fuzz projects to unblock fuzz blockers and increase project code coverage (and bugs found) for free.
24
+ 2. Completely automatic fuzz target generation for completely new OSS-Fuzz projects. This is much more challenging than 1, and is an extension of it.
25
+
26
+ Our current experiments focus on the first use case for C/C++ projects. This report serves as a preliminary investigation into how effective LLMs are for this use case. More detailed results and the experimentation framework for our research will be published at a later date.
27
+
28
+
29
+ # Experiment framework
30
+
31
+ To discover whether an LLM could successfully write new fuzz targets, we built an evaluation framework that connects OSS-Fuzz to Google’s LLMs, conducts the experiment, and evaluates the results. The steps look like this:
32
+
33
+ ![experiment framework]({{ site.baseurl }}/images/llm_framework.png "image_tooltip")
34
+
35
+ 1. OSS-Fuzz’s [Fuzz Introspector tool](http://introspector.oss-fuzz.com/) identifies an under-fuzzed, high-potential, portion of the target project’s code and passes the code to the evaluation framework.
36
+ 2. The evaluation framework creates a prompt that the LLM will use to write the new fuzz target. The prompt includes project specific information.
37
+ 3. The evaluation framework takes the fuzz target generated by the LLM and runs the new target.
38
+ 4. The evaluation framework observes the run for any change in code coverage or crashes.
39
+ 5. In the event that the fuzz target fails to compile, the evaluation framework prompts the LLM to write a revised fuzz target that addresses the compilation errors.
40
+
41
+
42
+ ## 1. Identifying high potential portions of the project’s code
43
+
44
+ We leverage [Fuzz Introspector](https://introspector.oss-fuzz.com/) ([example JSON endpoint](https://introspector.oss-fuzz.com/api/far-reach-but-low-coverage?project=tinyxml2)) to provide us with a list of functions with low runtime coverage (but high potential to reach more code coverage). These are turned into benchmark YAML files, which consist of an OSS-Fuzz project, and a list of function signatures to generate new targets for.
45
+
46
+ We have started with a small set of benchmarks, and will gradually scale this to larger, automated sets of benchmarks taken from all of OSS-Fuzz as we improve the function selection and prompt generation process.
47
+
48
+ Example benchmark (YAML):
49
+
50
+ ```yaml
51
+ functions:
52
+ - XML_Parser XMLCALL XML_ExternalEntityParserCreate(XML_Parser oldParser, const XML_Char
53
+ *context, const XML_Char *encodingName)
54
+ - XML_Parser XMLCALL XML_ParserCreateNS(const XML_Char *encodingName, XML_Char nsSep)
55
+ - XML_Bool XMLCALL XML_ParserReset(XML_Parser parser, const XML_Char *encodingName)
56
+ - static enum XML_Error PTRCALL externalParEntInitProcessor(XML_Parser parser, const
57
+ char *s, const char *end, const char **nextPtr)
58
+ project: expat
59
+ target_path: /src/expat/expat/fuzz/xml_parse_fuzzer.c
60
+ target_name: xml_parse_fuzzer_UTF-8
61
+ ```
62
+
63
+ ## 2. Prompt generation
64
+
65
+ We dynamically generate a prompt based on a template ([example](https://storage.googleapis.com/oss-fuzz-llm-targets-public/jsoncpp-json-value-removeindex/prompts.txt)).
66
+
67
+ As part of our experimentation, we tried various different prompt approaches. So far, the best results have come from including:
68
+
69
+ * One example of an existing function signature and fuzz target from the project under test, formatted into problem and solution structure. Too many examples yields worse results.
70
+ * Two examples from other projects in OSS-Fuzz, formatted in the same way.
71
+ * Examples of how to leverage [FuzzedDataProvider](https://github.com/google/fuzzing/blob/master/docs/split-inputs.md#fuzzed-data-provider) to generate inputs for function arguments.
72
+ * A priming that gives the task context.
73
+ * Examples of code anti-patterns to avoid.
74
+
75
+ The dynamically generated sections today include examples of existing fuzz targets from both other projects on OSS-Fuzz as well as one example from the project under test. We have other unexplored ideas including more structured information about the function under test, such as:
76
+
77
+ * Relevant data structure definitions
78
+ * Function implementations of the function under test and related functions
79
+ * Usages of the function under test and related functions
80
+
81
+
82
+ ## 3. Build and run
83
+
84
+ We leverage the OSS-Fuzz build infrastructure to build new targets by replacing an existing target’s source code with the newly generated target source code.
85
+
86
+ OSS-Fuzz projects often have strict compiler flags on by default. To make compilation easier, we also implemented a [compiler wrapper](https://github.com/google/oss-fuzz/blob/d78275b4e2e17d3d8f12b99db2b51de4b114edb3/infra/base-images/base-builder/jcc.go) that:
87
+
88
+ * Turns off compiler warnings to prevent trivial issues such as missing pointer casts from blocking compilation.
89
+ * Re-compiles targets as C++ (to leverage [FuzzedDataProvider](https://github.com/google/fuzzing/blob/master/docs/split-inputs.md#fuzzed-data-provider)).
90
+
91
+
92
+ ## 4. Measuring quality of generated targets
93
+
94
+ An important part of our research is to define metrics to measure the quality of generated targets.
95
+
96
+ These metrics are:
97
+
98
+ * Syntax correctness and project consistency. This is measured by its compilation result. For example: whether it compiles successfully, does it call functions in the project correctly without hallucination.
99
+ * Whether it crashes instantly or within the fuzz target. This often means that there is some miscalled API and the crashes are likely to be false positives.
100
+ * **New code coverage**. This is measured by the new lines it covered compared to all existing targets in OSS-Fuzz for the same project.
101
+
102
+ All of these metrics can be automatically computed for a given generated target.
103
+
104
+
105
+ ## 5. LLM Code Fixer
106
+
107
+ The fuzz targets generated by LLM often contain various trivial defects, which can be fixed by a separate LLM query.
108
+
109
+ The prompt of the code fixing query is structured as follows, where the raw code and error are respectively replaced with the fuzz target source code generated by the LLM and the build error messages extracted from pages of build logs:
110
+
111
+ ````
112
+ Given the following code and its build error message, fix the code without affecting its functionality.
113
+ First explain the reason, then output the whole fixed code.
114
+ If a function is missing, fix it by including the related libraries.
115
+ Code:
116
+ ```
117
+ {raw_code}
118
+ ```
119
+ Build error message:
120
+ ```
121
+ {error}
122
+ ```
123
+ Fixed code:
124
+ ````
125
+
126
+ Several rounds of code fixing queries are required for some cases. For example, when multiple defects incurs several error messages, sometimes LLM tends to only fix one of them at a time. Similarly, new defects may be introduced during code fixing. In these cases, we found iteratively querying LLM with the same prompt structure will gradually fix all errors.
127
+
128
+ LLM often proposes several responses for each query, we prefer the one with the longest code. This is an implementation decision to avoid a quadratically increasing number of targets to build (e.g. the LLMs could propose 4 new targets across N iterations) and to avoid the LLM deleting the function code to fix build failures.
129
+
130
+ Additionally, we also check that the generated target includes a call to the requested function to test. If it does not, this is surfaced as an error to the LLM.
131
+
132
+
133
+ ### Example
134
+
135
+ [Prompt](https://storage.googleapis.com/oss-fuzz-llm-targets-public/tinyxml2-tinyxml2-xmldocument-print/fixes/04-F4/prompt.txt): Incorrect target with missing arguments passed to target function.
136
+
137
+ [After fix](https://storage.googleapis.com/oss-fuzz-llm-targets-public/tinyxml2-tinyxml2-xmldocument-print/fixes/04-F4/01.cpp): Correct function argument added.
138
+
139
+ # Results
140
+
141
+ Initially, getting any compilable output was a challenge. We were able to improve this via prompt engineering and our compiler wrapper to having [14/31 tested OSS-Fuzz projects](https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=benchmarks/) successfully compile new targets and increase coverage. The successful examples and prompts are published [here](https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html).
142
+
143
+ We see a wide range of coverage improvements from 0-31% code coverage increases.
144
+
145
+ The top coverage increases, aggregated across all benchmarks per OSS-Fuzz project are:
146
+
147
+
148
+ <table>
149
+ <tr>
150
+ <td style="background-color: null">tinyxml2
151
+ </td>
152
+ <td style="background-color: null">31%
153
+ </td>
154
+ </tr>
155
+ <tr>
156
+ <td style="background-color: null">cjson
157
+ </td>
158
+ <td style="background-color: null">6%
159
+ </td>
160
+ </tr>
161
+ <tr>
162
+ <td style="background-color: null">expat
163
+ </td>
164
+ <td style="background-color: null">4%
165
+ </td>
166
+ </tr>
167
+ <tr>
168
+ <td style="background-color: null">libplist
169
+ </td>
170
+ <td style="background-color: null">4%
171
+ </td>
172
+ </tr>
173
+ <tr>
174
+ <td style="background-color: null">libxml2
175
+ </td>
176
+ <td style="background-color: null">1%
177
+ </td>
178
+ </tr>
179
+ <tr>
180
+ <td style="background-color: null">elfutils
181
+ </td>
182
+ <td style="background-color: null">1%
183
+ </td>
184
+ </tr>
185
+ </table>
186
+
187
+
188
+ The best result we’ve had is with the TinyXML2 project, where we managed to increase fuzz coverage from [38%](https://storage.googleapis.com/oss-fuzz-coverage/tinyxml2/reports/20230801/linux/report.html) line coverage to [69%](https://storage.googleapis.com/oss-fuzz-coverage/llm-results/tinyxml2/linux/report.html) line coverage without any interventions.
189
+
190
+
191
+
192
+
193
+ ![alt_text]({{ site.baseurl }}/images/tinyxml2_examples.png "image_tooltip")
194
+
195
+
196
+ Additionally, we targeted OpenSSL from the perspective of discovering past vulnerabilities that were not found due to lack of fuzzing coverage. We were able to replicate [a similar fuzz target](https://storage.googleapis.com/oss-fuzz-llm-targets-public/openssl-ossl_punycode_decode/targets/15.c) that rediscovered [CVE-2022-3602](https://nvd.nist.gov/vuln/detail/CVE-2022-3602).
197
+
198
+ ![alt_text]({{ site.baseurl }}/images/punycode.png "Stacktrace from LLM-generated target finding CVE-2022-3602")
199
+
200
+
201
+ # Future work
202
+
203
+ We’ve seen very promising early results in this space and will continue our research.
204
+
205
+
206
+ ## 1. Continue research
207
+
208
+ There are a number of areas we’d like to further research on:
209
+
210
+
211
+
212
+ * Expand benchmarks to all of OSS-Fuzz. We’d like to expand the set of benchmarks to cover all of OSS-Fuzz.
213
+ * Continued prompt engineering and experimentation with project-specific context, such as more structured context (e.g. structure definitions, implementations) around the relevant function to test.
214
+ * Model fine-tuning
215
+ * Expand to other languages beyond C/C++
216
+ * Expand research to completely new projects with no existing OSS-Fuzz integration.
217
+
218
+
219
+ ## 2. Open source evaluation framework
220
+
221
+ We plan to open source the evaluation framework we’ve built to help test arbitrary auto-fuzz target generation capabilities. We hope that OSS-Fuzz can serve as a valuable benchmarking platform for researchers in this space.
222
+
223
+
224
+ ## 3. OSS-Fuzz integration
225
+
226
+ Ultimately, the goal is to integrate the results of this research into OSS-Fuzz, to provide:
227
+
228
+
229
+
230
+ * Free coverage increases for existing projects
231
+ * Automated onboarding of new projects, and tools to help maintainers write manual fuzz targets.
232
+
233
+
234
+ # Appendix
235
+
236
+
237
+ ## Successful benchmark results
238
+
239
+ <table>
240
+ <tr>
241
+ <td style="background-color: null"><strong>Project</strong>
242
+ </td>
243
+ <td style="background-color: null"><strong>Function</strong>
244
+ </td>
245
+ <td style="background-color: null"><strong>Output</strong>
246
+ </td>
247
+ <td style="background-color: null"><strong>Build rate</strong>
248
+ </td>
249
+ <td style="background-color: null"><strong>Max Coverage</strong>
250
+ </td>
251
+ <td style="background-color: null"><strong>Max Line coverage diff</strong>
252
+ </td>
253
+ <td style="background-color: null"><strong>Reports</strong>
254
+ </td>
255
+ </tr>
256
+ <tr>
257
+ <td style="background-color: null">tinyxml2
258
+ </td>
259
+ <td style="background-color: null">tinyxml2-xmldocument-print
260
+ </td>
261
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/tinyxml2-tinyxml2-xmldocument-print/prompts.txt">Prompt</a>;
262
+ <br>
263
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmldocument-print/fixes/">Fixes</a>;
264
+ <br>
265
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmldocument-print/targets/">Targets</a>.
266
+ </td>
267
+ <td style="background-color: null"><p style="text-align: right">
268
+ 50</p>
269
+
270
+ </td>
271
+ <td style="background-color: null"><p style="text-align: right">
272
+ 29.74</p>
273
+
274
+ </td>
275
+ <td style="background-color: null"><p style="text-align: right">
276
+ 11.16</p>
277
+
278
+ </td>
279
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmldocument-print/report/">Reports</a>
280
+ </td>
281
+ </tr>
282
+ <tr>
283
+ <td style="background-color: null">tinyxml2
284
+ </td>
285
+ <td style="background-color: null">tinyxml2-xmldocument-deepcopy
286
+ </td>
287
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/tinyxml2-tinyxml2-xmldocument-deepcopy/prompts.txt">Prompt</a>;
288
+ <br>
289
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmldocument-deepcopy/fixes/">Fixes</a>;
290
+ <br>
291
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmldocument-deepcopy/targets/">Targets</a>.
292
+ </td>
293
+ <td style="background-color: null"><p style="text-align: right">
294
+ 25</p>
295
+
296
+ </td>
297
+ <td style="background-color: null"><p style="text-align: right">
298
+ 26.8</p>
299
+
300
+ </td>
301
+ <td style="background-color: null"><p style="text-align: right">
302
+ 4.45</p>
303
+
304
+ </td>
305
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmldocument-deepcopy/report/">Reports</a>
306
+ </td>
307
+ </tr>
308
+ <tr>
309
+ <td style="background-color: null">tinyxml2
310
+ </td>
311
+ <td style="background-color: null">tinyxml2-xmlelement-setattribute
312
+ </td>
313
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/tinyxml2-tinyxml2-xmlelement-setattribute/prompts.txt">Prompt</a>;
314
+ <br>
315
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-setattribute/fixes/">Fixes</a>;
316
+ <br>
317
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-setattribute/targets/">Targets</a>.
318
+ </td>
319
+ <td style="background-color: null"><p style="text-align: right">
320
+ 75</p>
321
+
322
+ </td>
323
+ <td style="background-color: null"><p style="text-align: right">
324
+ 26.08</p>
325
+
326
+ </td>
327
+ <td style="background-color: null"><p style="text-align: right">
328
+ 3.77</p>
329
+
330
+ </td>
331
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-setattribute/report/">Reports</a>
332
+ </td>
333
+ </tr>
334
+ <tr>
335
+ <td style="background-color: null">libplist
336
+ </td>
337
+ <td style="background-color: null">plist_print
338
+ </td>
339
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/libplist-plist_print/prompts.txt">Prompt</a>;
340
+ <br>
341
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libplist-plist_print/fixes/">Fixes</a>;
342
+ <br>
343
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libplist-plist_print/targets/">Targets</a>.
344
+ </td>
345
+ <td style="background-color: null"><p style="text-align: right">
346
+ 25</p>
347
+
348
+ </td>
349
+ <td style="background-color: null"><p style="text-align: right">
350
+ 12.88</p>
351
+
352
+ </td>
353
+ <td style="background-color: null"><p style="text-align: right">
354
+ 3.42</p>
355
+
356
+ </td>
357
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libplist-plist_print/report/">Reports</a>
358
+ </td>
359
+ </tr>
360
+ <tr>
361
+ <td style="background-color: null">tinyxml2
362
+ </td>
363
+ <td style="background-color: null">tinyxml2-xmlelement-doubletext
364
+ </td>
365
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/tinyxml2-tinyxml2-xmlelement-doubletext/prompts.txt">Prompt</a>;
366
+ <br>
367
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-doubletext/fixes/">Fixes</a>;
368
+ <br>
369
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-doubletext/targets/">Targets</a>.
370
+ </td>
371
+ <td style="background-color: null"><p style="text-align: right">
372
+ 62.5</p>
373
+
374
+ </td>
375
+ <td style="background-color: null"><p style="text-align: right">
376
+ 25.61</p>
377
+
378
+ </td>
379
+ <td style="background-color: null"><p style="text-align: right">
380
+ 3.28</p>
381
+
382
+ </td>
383
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-doubletext/report/">Reports</a>
384
+ </td>
385
+ </tr>
386
+ <tr>
387
+ <td style="background-color: null">tinyxml2
388
+ </td>
389
+ <td style="background-color: null">tinyxml2-xmlelement-booltext
390
+ </td>
391
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/tinyxml2-tinyxml2-xmlelement-booltext/prompts.txt">Prompt</a>;
392
+ <br>
393
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-booltext/fixes/">Fixes</a>;
394
+ <br>
395
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-booltext/targets/">Targets</a>.
396
+ </td>
397
+ <td style="background-color: null"><p style="text-align: right">
398
+ 87.5</p>
399
+
400
+ </td>
401
+ <td style="background-color: null"><p style="text-align: right">
402
+ 26.18</p>
403
+
404
+ </td>
405
+ <td style="background-color: null"><p style="text-align: right">
406
+ 2.9</p>
407
+
408
+ </td>
409
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-booltext/report/">Reports</a>
410
+ </td>
411
+ </tr>
412
+ <tr>
413
+ <td style="background-color: null">tinyxml2
414
+ </td>
415
+ <td style="background-color: null">tinyxml2-xmlelement-insertnewunknown
416
+ </td>
417
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/tinyxml2-tinyxml2-xmlelement-insertnewunknown/prompts.txt">Prompt</a>;
418
+ <br>
419
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-insertnewunknown/fixes/">Fixes</a>;
420
+ <br>
421
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-insertnewunknown/targets/">Targets</a>.
422
+ </td>
423
+ <td style="background-color: null"><p style="text-align: right">
424
+ 25</p>
425
+
426
+ </td>
427
+ <td style="background-color: null"><p style="text-align: right">
428
+ 25.67</p>
429
+
430
+ </td>
431
+ <td style="background-color: null"><p style="text-align: right">
432
+ 2.64</p>
433
+
434
+ </td>
435
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-insertnewunknown/report/">Reports</a>
436
+ </td>
437
+ </tr>
438
+ <tr>
439
+ <td style="background-color: null">tinyxml2
440
+ </td>
441
+ <td style="background-color: null">tinyxml2-xmlelement-int64text
442
+ </td>
443
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/tinyxml2-tinyxml2-xmlelement-int64text/prompts.txt">Prompt</a>;
444
+ <br>
445
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-int64text/fixes/">Fixes</a>;
446
+ <br>
447
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-int64text/targets/">Targets</a>.
448
+ </td>
449
+ <td style="background-color: null"><p style="text-align: right">
450
+ 87.5</p>
451
+
452
+ </td>
453
+ <td style="background-color: null"><p style="text-align: right">
454
+ 25.91</p>
455
+
456
+ </td>
457
+ <td style="background-color: null"><p style="text-align: right">
458
+ 2.64</p>
459
+
460
+ </td>
461
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-int64text/report/">Reports</a>
462
+ </td>
463
+ </tr>
464
+ <tr>
465
+ <td style="background-color: null">cjson
466
+ </td>
467
+ <td style="background-color: null">cjson_compare
468
+ </td>
469
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/cjson-cjson_compare/prompts.txt">Prompt</a>;
470
+ <br>
471
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=cjson-cjson_compare/fixes/">Fixes</a>;
472
+ <br>
473
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=cjson-cjson_compare/targets/">Targets</a>.
474
+ </td>
475
+ <td style="background-color: null"><p style="text-align: right">
476
+ 75</p>
477
+
478
+ </td>
479
+ <td style="background-color: null"><p style="text-align: right">
480
+ 29.68</p>
481
+
482
+ </td>
483
+ <td style="background-color: null"><p style="text-align: right">
484
+ 2.47</p>
485
+
486
+ </td>
487
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=cjson-cjson_compare/report/">Reports</a>
488
+ </td>
489
+ </tr>
490
+ <tr>
491
+ <td style="background-color: null">tinyxml2
492
+ </td>
493
+ <td style="background-color: null">tinyxml2-xmlelement-floattext
494
+ </td>
495
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/tinyxml2-tinyxml2-xmlelement-floattext/prompts.txt">Prompt</a>;
496
+ <br>
497
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-floattext/fixes/">Fixes</a>;
498
+ <br>
499
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-floattext/targets/">Targets</a>.
500
+ </td>
501
+ <td style="background-color: null"><p style="text-align: right">
502
+ 62.5</p>
503
+
504
+ </td>
505
+ <td style="background-color: null"><p style="text-align: right">
506
+ 25.09</p>
507
+
508
+ </td>
509
+ <td style="background-color: null"><p style="text-align: right">
510
+ 2.45</p>
511
+
512
+ </td>
513
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-floattext/report/">Reports</a>
514
+ </td>
515
+ </tr>
516
+ <tr>
517
+ <td style="background-color: null">tinyxml2
518
+ </td>
519
+ <td style="background-color: null">tinyxml2-xmlelement-inttext
520
+ </td>
521
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/tinyxml2-tinyxml2-xmlelement-inttext/prompts.txt">Prompt</a>;
522
+ <br>
523
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-inttext/fixes/">Fixes</a>;
524
+ <br>
525
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-inttext/targets/">Targets</a>.
526
+ </td>
527
+ <td style="background-color: null"><p style="text-align: right">
528
+ 75</p>
529
+
530
+ </td>
531
+ <td style="background-color: null"><p style="text-align: right">
532
+ 26.2</p>
533
+
534
+ </td>
535
+ <td style="background-color: null"><p style="text-align: right">
536
+ 2.41</p>
537
+
538
+ </td>
539
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-inttext/report/">Reports</a>
540
+ </td>
541
+ </tr>
542
+ <tr>
543
+ <td style="background-color: null">tinyxml2
544
+ </td>
545
+ <td style="background-color: null">tinyxml2-xmlelement-unsigned64text
546
+ </td>
547
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/tinyxml2-tinyxml2-xmlelement-unsigned64text/prompts.txt">Prompt</a>;
548
+ <br>
549
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-unsigned64text/fixes/">Fixes</a>;
550
+ <br>
551
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-unsigned64text/targets/">Targets</a>.
552
+ </td>
553
+ <td style="background-color: null"><p style="text-align: right">
554
+ 37.5</p>
555
+
556
+ </td>
557
+ <td style="background-color: null"><p style="text-align: right">
558
+ 25.74</p>
559
+
560
+ </td>
561
+ <td style="background-color: null"><p style="text-align: right">
562
+ 2.22</p>
563
+
564
+ </td>
565
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-unsigned64text/report/">Reports</a>
566
+ </td>
567
+ </tr>
568
+ <tr>
569
+ <td style="background-color: null">tinyobjloader
570
+ </td>
571
+ <td style="background-color: null">tinyobj-objreader-parsefromfile
572
+ </td>
573
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/tinyobjloader-tinyobj-objreader-parsefromfile/prompts.txt">Prompt</a>;
574
+ <br>
575
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyobjloader-tinyobj-objreader-parsefromfile/fixes/">Fixes</a>;
576
+ <br>
577
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyobjloader-tinyobj-objreader-parsefromfile/targets/">Targets</a>.
578
+ </td>
579
+ <td style="background-color: null"><p style="text-align: right">
580
+ 37.5</p>
581
+
582
+ </td>
583
+ <td style="background-color: null"><p style="text-align: right">
584
+ 5.7</p>
585
+
586
+ </td>
587
+ <td style="background-color: null"><p style="text-align: right">
588
+ 2.16</p>
589
+
590
+ </td>
591
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyobjloader-tinyobj-objreader-parsefromfile/report/">Reports</a>
592
+ </td>
593
+ </tr>
594
+ <tr>
595
+ <td style="background-color: null">tinyxml2
596
+ </td>
597
+ <td style="background-color: null">tinyxml2-xmlelement-unsignedtext
598
+ </td>
599
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/tinyxml2-tinyxml2-xmlelement-unsignedtext/prompts.txt">Prompt</a>;
600
+ <br>
601
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-unsignedtext/fixes/">Fixes</a>;
602
+ <br>
603
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-unsignedtext/targets/">Targets</a>.
604
+ </td>
605
+ <td style="background-color: null"><p style="text-align: right">
606
+ 50</p>
607
+
608
+ </td>
609
+ <td style="background-color: null"><p style="text-align: right">
610
+ 25.53</p>
611
+
612
+ </td>
613
+ <td style="background-color: null"><p style="text-align: right">
614
+ 2.15</p>
615
+
616
+ </td>
617
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-unsignedtext/report/">Reports</a>
618
+ </td>
619
+ </tr>
620
+ <tr>
621
+ <td style="background-color: null">tinyxml2
622
+ </td>
623
+ <td style="background-color: null">tinyxml2-xmlelement-shallowclone
624
+ </td>
625
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/tinyxml2-tinyxml2-xmlelement-shallowclone/prompts.txt">Prompt</a>;
626
+ <br>
627
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-shallowclone/fixes/">Fixes</a>;
628
+ <br>
629
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-shallowclone/targets/">Targets</a>.
630
+ </td>
631
+ <td style="background-color: null"><p style="text-align: right">
632
+ 50</p>
633
+
634
+ </td>
635
+ <td style="background-color: null"><p style="text-align: right">
636
+ 25.03</p>
637
+
638
+ </td>
639
+ <td style="background-color: null"><p style="text-align: right">
640
+ 2.07</p>
641
+
642
+ </td>
643
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-shallowclone/report/">Reports</a>
644
+ </td>
645
+ </tr>
646
+ <tr>
647
+ <td style="background-color: null">cjson
648
+ </td>
649
+ <td style="background-color: null">cjson_replaceiteminobject
650
+ </td>
651
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/cjson-cjson_replaceiteminobject/prompts.txt">Prompt</a>;
652
+ <br>
653
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=cjson-cjson_replaceiteminobject/fixes/">Fixes</a>;
654
+ <br>
655
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=cjson-cjson_replaceiteminobject/targets/">Targets</a>.
656
+ </td>
657
+ <td style="background-color: null"><p style="text-align: right">
658
+ 37.5</p>
659
+
660
+ </td>
661
+ <td style="background-color: null"><p style="text-align: right">
662
+ 27.56</p>
663
+
664
+ </td>
665
+ <td style="background-color: null"><p style="text-align: right">
666
+ 1.98</p>
667
+
668
+ </td>
669
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=cjson-cjson_replaceiteminobject/report/">Reports</a>
670
+ </td>
671
+ </tr>
672
+ <tr>
673
+ <td style="background-color: null">tinyxml2
674
+ </td>
675
+ <td style="background-color: null">tinyxml2-xmlelement-gettext
676
+ </td>
677
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/tinyxml2-tinyxml2-xmlelement-gettext/prompts.txt">Prompt</a>;
678
+ <br>
679
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-gettext/fixes/">Fixes</a>;
680
+ <br>
681
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-gettext/targets/">Targets</a>.
682
+ </td>
683
+ <td style="background-color: null"><p style="text-align: right">
684
+ 37.5</p>
685
+
686
+ </td>
687
+ <td style="background-color: null"><p style="text-align: right">
688
+ 25.42</p>
689
+
690
+ </td>
691
+ <td style="background-color: null"><p style="text-align: right">
692
+ 1.96</p>
693
+
694
+ </td>
695
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-gettext/report/">Reports</a>
696
+ </td>
697
+ </tr>
698
+ <tr>
699
+ <td style="background-color: null">tinyxml2
700
+ </td>
701
+ <td style="background-color: null">tinyxml2-xmlelement-shallowequal
702
+ </td>
703
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/tinyxml2-tinyxml2-xmlelement-shallowequal/prompts.txt">Prompt</a>;
704
+ <br>
705
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-shallowequal/fixes/">Fixes</a>;
706
+ <br>
707
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-shallowequal/targets/">Targets</a>.
708
+ </td>
709
+ <td style="background-color: null"><p style="text-align: right">
710
+ 62.5</p>
711
+
712
+ </td>
713
+ <td style="background-color: null"><p style="text-align: right">
714
+ 25.58</p>
715
+
716
+ </td>
717
+ <td style="background-color: null"><p style="text-align: right">
718
+ 1.96</p>
719
+
720
+ </td>
721
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-shallowequal/report/">Reports</a>
722
+ </td>
723
+ </tr>
724
+ <tr>
725
+ <td style="background-color: null">cjson
726
+ </td>
727
+ <td style="background-color: null">cjson_duplicate
728
+ </td>
729
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/cjson-cjson_duplicate/prompts.txt">Prompt</a>;
730
+ <br>
731
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=cjson-cjson_duplicate/fixes/">Fixes</a>;
732
+ <br>
733
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=cjson-cjson_duplicate/targets/">Targets</a>.
734
+ </td>
735
+ <td style="background-color: null"><p style="text-align: right">
736
+ 62.5</p>
737
+
738
+ </td>
739
+ <td style="background-color: null"><p style="text-align: right">
740
+ 27.4</p>
741
+
742
+ </td>
743
+ <td style="background-color: null"><p style="text-align: right">
744
+ 1.89</p>
745
+
746
+ </td>
747
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=cjson-cjson_duplicate/report/">Reports</a>
748
+ </td>
749
+ </tr>
750
+ <tr>
751
+ <td style="background-color: null">expat
752
+ </td>
753
+ <td style="background-color: null">xml_externalentityparsercreate
754
+ </td>
755
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/expat-xml_externalentityparsercreate/prompts.txt">Prompt</a>;
756
+ <br>
757
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=expat-xml_externalentityparsercreate/fixes/">Fixes</a>;
758
+ <br>
759
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=expat-xml_externalentityparsercreate/targets/">Targets</a>.
760
+ </td>
761
+ <td style="background-color: null"><p style="text-align: right">
762
+ 12.5</p>
763
+
764
+ </td>
765
+ <td style="background-color: null"><p style="text-align: right">
766
+ 1.25</p>
767
+
768
+ </td>
769
+ <td style="background-color: null"><p style="text-align: right">
770
+ 1.88</p>
771
+
772
+ </td>
773
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=expat-xml_externalentityparsercreate/report/">Reports</a>
774
+ </td>
775
+ </tr>
776
+ <tr>
777
+ <td style="background-color: null">cjson
778
+ </td>
779
+ <td style="background-color: null">cjson_replaceiteminobjectcasesensitive
780
+ </td>
781
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/cjson-cjson_replaceiteminobjectcasesensitive/prompts.txt">Prompt</a>;
782
+ <br>
783
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=cjson-cjson_replaceiteminobjectcasesensitive/fixes/">Fixes</a>;
784
+ <br>
785
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=cjson-cjson_replaceiteminobjectcasesensitive/targets/">Targets</a>.
786
+ </td>
787
+ <td style="background-color: null"><p style="text-align: right">
788
+ 87.5</p>
789
+
790
+ </td>
791
+ <td style="background-color: null"><p style="text-align: right">
792
+ 25.54</p>
793
+
794
+ </td>
795
+ <td style="background-color: null"><p style="text-align: right">
796
+ 1.85</p>
797
+
798
+ </td>
799
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=cjson-cjson_replaceiteminobjectcasesensitive/report/">Reports</a>
800
+ </td>
801
+ </tr>
802
+ <tr>
803
+ <td style="background-color: null">tinyxml2
804
+ </td>
805
+ <td style="background-color: null">tinyxml2-xmlelement-insertnewcomment
806
+ </td>
807
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/tinyxml2-tinyxml2-xmlelement-insertnewcomment/prompts.txt">Prompt</a>;
808
+ <br>
809
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-insertnewcomment/fixes/">Fixes</a>;
810
+ <br>
811
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-insertnewcomment/targets/">Targets</a>.
812
+ </td>
813
+ <td style="background-color: null"><p style="text-align: right">
814
+ 62.5</p>
815
+
816
+ </td>
817
+ <td style="background-color: null"><p style="text-align: right">
818
+ 25.61</p>
819
+
820
+ </td>
821
+ <td style="background-color: null"><p style="text-align: right">
822
+ 1.85</p>
823
+
824
+ </td>
825
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-insertnewcomment/report/">Reports</a>
826
+ </td>
827
+ </tr>
828
+ <tr>
829
+ <td style="background-color: null">expat
830
+ </td>
831
+ <td style="background-color: null">xml_parsercreatens
832
+ </td>
833
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/expat-xml_parsercreatens/prompts.txt">Prompt</a>;
834
+ <br>
835
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=expat-xml_parsercreatens/fixes/">Fixes</a>;
836
+ <br>
837
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=expat-xml_parsercreatens/targets/">Targets</a>.
838
+ </td>
839
+ <td style="background-color: null"><p style="text-align: right">
840
+ 12.5</p>
841
+
842
+ </td>
843
+ <td style="background-color: null"><p style="text-align: right">
844
+ 45.6</p>
845
+
846
+ </td>
847
+ <td style="background-color: null"><p style="text-align: right">
848
+ 1.84</p>
849
+
850
+ </td>
851
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=expat-xml_parsercreatens/report/">Reports</a>
852
+ </td>
853
+ </tr>
854
+ <tr>
855
+ <td style="background-color: null">tinyxml2
856
+ </td>
857
+ <td style="background-color: null">tinyxml2-xmlelement-deleteattribute
858
+ </td>
859
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/tinyxml2-tinyxml2-xmlelement-deleteattribute/prompts.txt">Prompt</a>;
860
+ <br>
861
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-deleteattribute/fixes/">Fixes</a>;
862
+ <br>
863
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-deleteattribute/targets/">Targets</a>.
864
+ </td>
865
+ <td style="background-color: null"><p style="text-align: right">
866
+ 50</p>
867
+
868
+ </td>
869
+ <td style="background-color: null"><p style="text-align: right">
870
+ 25.73</p>
871
+
872
+ </td>
873
+ <td style="background-color: null"><p style="text-align: right">
874
+ 1.7</p>
875
+
876
+ </td>
877
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-deleteattribute/report/">Reports</a>
878
+ </td>
879
+ </tr>
880
+ <tr>
881
+ <td style="background-color: null">tinyxml2
882
+ </td>
883
+ <td style="background-color: null">tinyxml2-xmlelement-insertnewdeclaration
884
+ </td>
885
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/tinyxml2-tinyxml2-xmlelement-insertnewdeclaration/prompts.txt">Prompt</a>;
886
+ <br>
887
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-insertnewdeclaration/fixes/">Fixes</a>;
888
+ <br>
889
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-insertnewdeclaration/targets/">Targets</a>.
890
+ </td>
891
+ <td style="background-color: null"><p style="text-align: right">
892
+ 50</p>
893
+
894
+ </td>
895
+ <td style="background-color: null"><p style="text-align: right">
896
+ 25</p>
897
+
898
+ </td>
899
+ <td style="background-color: null"><p style="text-align: right">
900
+ 1.7</p>
901
+
902
+ </td>
903
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-insertnewdeclaration/report/">Reports</a>
904
+ </td>
905
+ </tr>
906
+ <tr>
907
+ <td style="background-color: null">tinyxml2
908
+ </td>
909
+ <td style="background-color: null">tinyxml2-xmlelement-insertnewchildelement
910
+ </td>
911
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/tinyxml2-tinyxml2-xmlelement-insertnewchildelement/prompts.txt">Prompt</a>;
912
+ <br>
913
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-insertnewchildelement/fixes/">Fixes</a>;
914
+ <br>
915
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-insertnewchildelement/targets/">Targets</a>.
916
+ </td>
917
+ <td style="background-color: null"><p style="text-align: right">
918
+ 50</p>
919
+
920
+ </td>
921
+ <td style="background-color: null"><p style="text-align: right">
922
+ 24.88</p>
923
+
924
+ </td>
925
+ <td style="background-color: null"><p style="text-align: right">
926
+ 1.51</p>
927
+
928
+ </td>
929
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-insertnewchildelement/report/">Reports</a>
930
+ </td>
931
+ </tr>
932
+ <tr>
933
+ <td style="background-color: null">tinyxml2
934
+ </td>
935
+ <td style="background-color: null">tinyxml2-xmlnode-previoussiblingelement
936
+ </td>
937
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/tinyxml2-tinyxml2-xmlnode-previoussiblingelement/prompts.txt">Prompt</a>;
938
+ <br>
939
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlnode-previoussiblingelement/fixes/">Fixes</a>;
940
+ <br>
941
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlnode-previoussiblingelement/targets/">Targets</a>.
942
+ </td>
943
+ <td style="background-color: null"><p style="text-align: right">
944
+ 87.5</p>
945
+
946
+ </td>
947
+ <td style="background-color: null"><p style="text-align: right">
948
+ 26.08</p>
949
+
950
+ </td>
951
+ <td style="background-color: null"><p style="text-align: right">
952
+ 1.43</p>
953
+
954
+ </td>
955
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlnode-previoussiblingelement/report/">Reports</a>
956
+ </td>
957
+ </tr>
958
+ <tr>
959
+ <td style="background-color: null">tinyobjloader
960
+ </td>
961
+ <td style="background-color: null">tinyobj-loadobj
962
+ </td>
963
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/tinyobjloader-tinyobj-loadobj/prompts.txt">Prompt</a>;
964
+ <br>
965
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyobjloader-tinyobj-loadobj/fixes/">Fixes</a>;
966
+ <br>
967
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyobjloader-tinyobj-loadobj/targets/">Targets</a>.
968
+ </td>
969
+ <td style="background-color: null"><p style="text-align: right">
970
+ 25</p>
971
+
972
+ </td>
973
+ <td style="background-color: null"><p style="text-align: right">
974
+ 4.33</p>
975
+
976
+ </td>
977
+ <td style="background-color: null"><p style="text-align: right">
978
+ 1.35</p>
979
+
980
+ </td>
981
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyobjloader-tinyobj-loadobj/report/">Reports</a>
982
+ </td>
983
+ </tr>
984
+ <tr>
985
+ <td style="background-color: null">tinyobjloader
986
+ </td>
987
+ <td style="background-color: null">tinyobj-material_t-material_t
988
+ </td>
989
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/tinyobjloader-tinyobj-material_t-material_t/prompts.txt">Prompt</a>;
990
+ <br>
991
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyobjloader-tinyobj-material_t-material_t/fixes/">Fixes</a>;
992
+ <br>
993
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyobjloader-tinyobj-material_t-material_t/targets/">Targets</a>.
994
+ </td>
995
+ <td style="background-color: null"><p style="text-align: right">
996
+ 25</p>
997
+
998
+ </td>
999
+ <td style="background-color: null"><p style="text-align: right">
1000
+ 23.91</p>
1001
+
1002
+ </td>
1003
+ <td style="background-color: null"><p style="text-align: right">
1004
+ 1.35</p>
1005
+
1006
+ </td>
1007
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyobjloader-tinyobj-material_t-material_t/report/">Reports</a>
1008
+ </td>
1009
+ </tr>
1010
+ <tr>
1011
+ <td style="background-color: null">tinyxml2
1012
+ </td>
1013
+ <td style="background-color: null">tinyxml2-xmlelement-insertnewtext
1014
+ </td>
1015
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/tinyxml2-tinyxml2-xmlelement-insertnewtext/prompts.txt">Prompt</a>;
1016
+ <br>
1017
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-insertnewtext/fixes/">Fixes</a>;
1018
+ <br>
1019
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-insertnewtext/targets/">Targets</a>.
1020
+ </td>
1021
+ <td style="background-color: null"><p style="text-align: right">
1022
+ 62.5</p>
1023
+
1024
+ </td>
1025
+ <td style="background-color: null"><p style="text-align: right">
1026
+ 24.42</p>
1027
+
1028
+ </td>
1029
+ <td style="background-color: null"><p style="text-align: right">
1030
+ 1.32</p>
1031
+
1032
+ </td>
1033
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmlelement-insertnewtext/report/">Reports</a>
1034
+ </td>
1035
+ </tr>
1036
+ <tr>
1037
+ <td style="background-color: null">elfutils
1038
+ </td>
1039
+ <td style="background-color: null">dwfl_module_relocate_address
1040
+ </td>
1041
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/elfutils-dwfl_module_relocate_address/prompts.txt">Prompt</a>;
1042
+ <br>
1043
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=elfutils-dwfl_module_relocate_address/fixes/">Fixes</a>;
1044
+ <br>
1045
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=elfutils-dwfl_module_relocate_address/targets/">Targets</a>.
1046
+ </td>
1047
+ <td style="background-color: null"><p style="text-align: right">
1048
+ 87.5</p>
1049
+
1050
+ </td>
1051
+ <td style="background-color: null"><p style="text-align: right">
1052
+ 7.81</p>
1053
+
1054
+ </td>
1055
+ <td style="background-color: null"><p style="text-align: right">
1056
+ 1.1</p>
1057
+
1058
+ </td>
1059
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=elfutils-dwfl_module_relocate_address/report/">Reports</a>
1060
+ </td>
1061
+ </tr>
1062
+ <tr>
1063
+ <td style="background-color: null">libxml2
1064
+ </td>
1065
+ <td style="background-color: null">xmlschemavalidatefile
1066
+ </td>
1067
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/libxml2-xmlschemavalidatefile/prompts.txt">Prompt</a>;
1068
+ <br>
1069
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libxml2-xmlschemavalidatefile/fixes/">Fixes</a>;
1070
+ <br>
1071
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libxml2-xmlschemavalidatefile/targets/">Targets</a>.
1072
+ </td>
1073
+ <td style="background-color: null"><p style="text-align: right">
1074
+ 50</p>
1075
+
1076
+ </td>
1077
+ <td style="background-color: null"><p style="text-align: right">
1078
+ 4.18</p>
1079
+
1080
+ </td>
1081
+ <td style="background-color: null"><p style="text-align: right">
1082
+ 0.93</p>
1083
+
1084
+ </td>
1085
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libxml2-xmlschemavalidatefile/report/">Reports</a>
1086
+ </td>
1087
+ </tr>
1088
+ <tr>
1089
+ <td style="background-color: null">tinyxml2
1090
+ </td>
1091
+ <td style="background-color: null">tinyxml2-xmldocument-loadfile
1092
+ </td>
1093
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/tinyxml2-tinyxml2-xmldocument-loadfile/prompts.txt">Prompt</a>;
1094
+ <br>
1095
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmldocument-loadfile/fixes/">Fixes</a>;
1096
+ <br>
1097
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmldocument-loadfile/targets/">Targets</a>.
1098
+ </td>
1099
+ <td style="background-color: null"><p style="text-align: right">
1100
+ 25</p>
1101
+
1102
+ </td>
1103
+ <td style="background-color: null"><p style="text-align: right">
1104
+ 2.17</p>
1105
+
1106
+ </td>
1107
+ <td style="background-color: null"><p style="text-align: right">
1108
+ 0.9</p>
1109
+
1110
+ </td>
1111
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=tinyxml2-tinyxml2-xmldocument-loadfile/report/">Reports</a>
1112
+ </td>
1113
+ </tr>
1114
+ <tr>
1115
+ <td style="background-color: null">speex
1116
+ </td>
1117
+ <td style="background-color: null">ogg_stream_packetin
1118
+ </td>
1119
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/speex-ogg_stream_packetin/prompts.txt">Prompt</a>;
1120
+ <br>
1121
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=speex-ogg_stream_packetin/fixes/">Fixes</a>;
1122
+ <br>
1123
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=speex-ogg_stream_packetin/targets/">Targets</a>.
1124
+ </td>
1125
+ <td style="background-color: null"><p style="text-align: right">
1126
+ 25</p>
1127
+
1128
+ </td>
1129
+ <td style="background-color: null"><p style="text-align: right">
1130
+ 8.06</p>
1131
+
1132
+ </td>
1133
+ <td style="background-color: null"><p style="text-align: right">
1134
+ 0.55</p>
1135
+
1136
+ </td>
1137
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=speex-ogg_stream_packetin/report/">Reports</a>
1138
+ </td>
1139
+ </tr>
1140
+ <tr>
1141
+ <td style="background-color: null">libxml2
1142
+ </td>
1143
+ <td style="background-color: null">xmltextreadersetschema
1144
+ </td>
1145
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/libxml2-xmltextreadersetschema/prompts.txt">Prompt</a>;
1146
+ <br>
1147
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libxml2-xmltextreadersetschema/fixes/">Fixes</a>;
1148
+ <br>
1149
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libxml2-xmltextreadersetschema/targets/">Targets</a>.
1150
+ </td>
1151
+ <td style="background-color: null"><p style="text-align: right">
1152
+ 37.5</p>
1153
+
1154
+ </td>
1155
+ <td style="background-color: null"><p style="text-align: right">
1156
+ 1.44</p>
1157
+
1158
+ </td>
1159
+ <td style="background-color: null"><p style="text-align: right">
1160
+ 0.48</p>
1161
+
1162
+ </td>
1163
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libxml2-xmltextreadersetschema/report/">Reports</a>
1164
+ </td>
1165
+ </tr>
1166
+ <tr>
1167
+ <td style="background-color: null">libxml2
1168
+ </td>
1169
+ <td style="background-color: null">xmltextreaderschemavalidate
1170
+ </td>
1171
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/libxml2-xmltextreaderschemavalidate/prompts.txt">Prompt</a>;
1172
+ <br>
1173
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libxml2-xmltextreaderschemavalidate/fixes/">Fixes</a>;
1174
+ <br>
1175
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libxml2-xmltextreaderschemavalidate/targets/">Targets</a>.
1176
+ </td>
1177
+ <td style="background-color: null"><p style="text-align: right">
1178
+ 37.5</p>
1179
+
1180
+ </td>
1181
+ <td style="background-color: null"><p style="text-align: right">
1182
+ 4.03</p>
1183
+
1184
+ </td>
1185
+ <td style="background-color: null"><p style="text-align: right">
1186
+ 0.36</p>
1187
+
1188
+ </td>
1189
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libxml2-xmltextreaderschemavalidate/report/">Reports</a>
1190
+ </td>
1191
+ </tr>
1192
+ <tr>
1193
+ <td style="background-color: null">libplist
1194
+ </td>
1195
+ <td style="background-color: null">plist_dict_merge
1196
+ </td>
1197
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/libplist-plist_dict_merge/prompts.txt">Prompt</a>;
1198
+ <br>
1199
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libplist-plist_dict_merge/fixes/">Fixes</a>;
1200
+ <br>
1201
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libplist-plist_dict_merge/targets/">Targets</a>.
1202
+ </td>
1203
+ <td style="background-color: null"><p style="text-align: right">
1204
+ 12.5</p>
1205
+
1206
+ </td>
1207
+ <td style="background-color: null"><p style="text-align: right">
1208
+ 0.8</p>
1209
+
1210
+ </td>
1211
+ <td style="background-color: null"><p style="text-align: right">
1212
+ 0.35</p>
1213
+
1214
+ </td>
1215
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libplist-plist_dict_merge/report/">Reports</a>
1216
+ </td>
1217
+ </tr>
1218
+ <tr>
1219
+ <td style="background-color: null">libxml2
1220
+ </td>
1221
+ <td style="background-color: null">xmltextreaderschemavalidatectxt
1222
+ </td>
1223
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/libxml2-xmltextreaderschemavalidatectxt/prompts.txt">Prompt</a>;
1224
+ <br>
1225
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libxml2-xmltextreaderschemavalidatectxt/fixes/">Fixes</a>;
1226
+ <br>
1227
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libxml2-xmltextreaderschemavalidatectxt/targets/">Targets</a>.
1228
+ </td>
1229
+ <td style="background-color: null"><p style="text-align: right">
1230
+ 25</p>
1231
+
1232
+ </td>
1233
+ <td style="background-color: null"><p style="text-align: right">
1234
+ 1.19</p>
1235
+
1236
+ </td>
1237
+ <td style="background-color: null"><p style="text-align: right">
1238
+ 0.33</p>
1239
+
1240
+ </td>
1241
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libxml2-xmltextreaderschemavalidatectxt/report/">Reports</a>
1242
+ </td>
1243
+ </tr>
1244
+ <tr>
1245
+ <td style="background-color: null">cjson
1246
+ </td>
1247
+ <td style="background-color: null">cjson_printpreallocated
1248
+ </td>
1249
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/cjson-cjson_printpreallocated/prompts.txt">Prompt</a>;
1250
+ <br>
1251
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=cjson-cjson_printpreallocated/fixes/">Fixes</a>;
1252
+ <br>
1253
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=cjson-cjson_printpreallocated/targets/">Targets</a>.
1254
+ </td>
1255
+ <td style="background-color: null"><p style="text-align: right">
1256
+ 75</p>
1257
+
1258
+ </td>
1259
+ <td style="background-color: null"><p style="text-align: right">
1260
+ 26.44</p>
1261
+
1262
+ </td>
1263
+ <td style="background-color: null"><p style="text-align: right">
1264
+ 0.22</p>
1265
+
1266
+ </td>
1267
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=cjson-cjson_printpreallocated/report/">Reports</a>
1268
+ </td>
1269
+ </tr>
1270
+ <tr>
1271
+ <td style="background-color: null">libucl
1272
+ </td>
1273
+ <td style="background-color: null">ucl_parser_insert_chunk
1274
+ </td>
1275
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/libucl-ucl_parser_insert_chunk/prompts.txt">Prompt</a>;
1276
+ <br>
1277
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libucl-ucl_parser_insert_chunk/fixes/">Fixes</a>;
1278
+ <br>
1279
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libucl-ucl_parser_insert_chunk/targets/">Targets</a>.
1280
+ </td>
1281
+ <td style="background-color: null"><p style="text-align: right">
1282
+ 25</p>
1283
+
1284
+ </td>
1285
+ <td style="background-color: null"><p style="text-align: right">
1286
+ 10.5</p>
1287
+
1288
+ </td>
1289
+ <td style="background-color: null"><p style="text-align: right">
1290
+ 0.22</p>
1291
+
1292
+ </td>
1293
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libucl-ucl_parser_insert_chunk/report/">Reports</a>
1294
+ </td>
1295
+ </tr>
1296
+ <tr>
1297
+ <td style="background-color: null">libucl
1298
+ </td>
1299
+ <td style="background-color: null">ucl_object_compare
1300
+ </td>
1301
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/libucl-ucl_object_compare/prompts.txt">Prompt</a>;
1302
+ <br>
1303
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libucl-ucl_object_compare/fixes/">Fixes</a>;
1304
+ <br>
1305
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libucl-ucl_object_compare/targets/">Targets</a>.
1306
+ </td>
1307
+ <td style="background-color: null"><p style="text-align: right">
1308
+ 12.5</p>
1309
+
1310
+ </td>
1311
+ <td style="background-color: null"><p style="text-align: right">
1312
+ 1.35</p>
1313
+
1314
+ </td>
1315
+ <td style="background-color: null"><p style="text-align: right">
1316
+ 0.21</p>
1317
+
1318
+ </td>
1319
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libucl-ucl_object_compare/report/">Reports</a>
1320
+ </td>
1321
+ </tr>
1322
+ <tr>
1323
+ <td style="background-color: null">elfutils
1324
+ </td>
1325
+ <td style="background-color: null">dwarf_getlocations
1326
+ </td>
1327
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/elfutils-dwarf_getlocations/prompts.txt">Prompt</a>;
1328
+ <br>
1329
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=elfutils-dwarf_getlocations/fixes/">Fixes</a>;
1330
+ <br>
1331
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=elfutils-dwarf_getlocations/targets/">Targets</a>.
1332
+ </td>
1333
+ <td style="background-color: null"><p style="text-align: right">
1334
+ 62.5</p>
1335
+
1336
+ </td>
1337
+ <td style="background-color: null"><p style="text-align: right">
1338
+ 7.22</p>
1339
+
1340
+ </td>
1341
+ <td style="background-color: null"><p style="text-align: right">
1342
+ 0.2</p>
1343
+
1344
+ </td>
1345
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=elfutils-dwarf_getlocations/report/">Reports</a>
1346
+ </td>
1347
+ </tr>
1348
+ <tr>
1349
+ <td style="background-color: null">libucl
1350
+ </td>
1351
+ <td style="background-color: null">ucl_parser_add_fd_priority
1352
+ </td>
1353
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/libucl-ucl_parser_add_fd_priority/prompts.txt">Prompt</a>;
1354
+ <br>
1355
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libucl-ucl_parser_add_fd_priority/fixes/">Fixes</a>;
1356
+ <br>
1357
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libucl-ucl_parser_add_fd_priority/targets/">Targets</a>.
1358
+ </td>
1359
+ <td style="background-color: null"><p style="text-align: right">
1360
+ 71.43</p>
1361
+
1362
+ </td>
1363
+ <td style="background-color: null"><p style="text-align: right">
1364
+ 19.61</p>
1365
+
1366
+ </td>
1367
+ <td style="background-color: null"><p style="text-align: right">
1368
+ 0.18</p>
1369
+
1370
+ </td>
1371
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libucl-ucl_parser_add_fd_priority/report/">Reports</a>
1372
+ </td>
1373
+ </tr>
1374
+ <tr>
1375
+ <td style="background-color: null">jsoncpp
1376
+ </td>
1377
+ <td style="background-color: null">json-value-resize
1378
+ </td>
1379
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/jsoncpp-json-value-resize/prompts.txt">Prompt</a>;
1380
+ <br>
1381
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=jsoncpp-json-value-resize/fixes/">Fixes</a>;
1382
+ <br>
1383
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=jsoncpp-json-value-resize/targets/">Targets</a>.
1384
+ </td>
1385
+ <td style="background-color: null"><p style="text-align: right">
1386
+ 37.5</p>
1387
+
1388
+ </td>
1389
+ <td style="background-color: null"><p style="text-align: right">
1390
+ 2.23</p>
1391
+
1392
+ </td>
1393
+ <td style="background-color: null"><p style="text-align: right">
1394
+ 0.17</p>
1395
+
1396
+ </td>
1397
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=jsoncpp-json-value-resize/report/">Reports</a>
1398
+ </td>
1399
+ </tr>
1400
+ <tr>
1401
+ <td style="background-color: null">mosquitto
1402
+ </td>
1403
+ <td style="background-color: null">mosquitto_topic_matches_sub2
1404
+ </td>
1405
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/mosquitto-mosquitto_topic_matches_sub2/prompts.txt">Prompt</a>;
1406
+ <br>
1407
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=mosquitto-mosquitto_topic_matches_sub2/fixes/">Fixes</a>;
1408
+ <br>
1409
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=mosquitto-mosquitto_topic_matches_sub2/targets/">Targets</a>.
1410
+ </td>
1411
+ <td style="background-color: null"><p style="text-align: right">
1412
+ 87.5</p>
1413
+
1414
+ </td>
1415
+ <td style="background-color: null"><p style="text-align: right">
1416
+ 28.28</p>
1417
+
1418
+ </td>
1419
+ <td style="background-color: null"><p style="text-align: right">
1420
+ 0.16</p>
1421
+
1422
+ </td>
1423
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=mosquitto-mosquitto_topic_matches_sub2/report/">Reports</a>
1424
+ </td>
1425
+ </tr>
1426
+ <tr>
1427
+ <td style="background-color: null">xvid
1428
+ </td>
1429
+ <td style="background-color: null">xvid_encore
1430
+ </td>
1431
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/xvid-xvid_encore/prompts.txt">Prompt</a>;
1432
+ <br>
1433
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=xvid-xvid_encore/fixes/">Fixes</a>;
1434
+ <br>
1435
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=xvid-xvid_encore/targets/">Targets</a>.
1436
+ </td>
1437
+ <td style="background-color: null"><p style="text-align: right">
1438
+ 31.25</p>
1439
+
1440
+ </td>
1441
+ <td style="background-color: null"><p style="text-align: right">
1442
+ 0.22</p>
1443
+
1444
+ </td>
1445
+ <td style="background-color: null"><p style="text-align: right">
1446
+ 0.16</p>
1447
+
1448
+ </td>
1449
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=xvid-xvid_encore/report/">Reports</a>
1450
+ </td>
1451
+ </tr>
1452
+ <tr>
1453
+ <td style="background-color: null">cjson
1454
+ </td>
1455
+ <td style="background-color: null">cjson_parse
1456
+ </td>
1457
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/cjson-cjson_parse/prompts.txt">Prompt</a>;
1458
+ <br>
1459
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=cjson-cjson_parse/fixes/">Fixes</a>;
1460
+ <br>
1461
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=cjson-cjson_parse/targets/">Targets</a>.
1462
+ </td>
1463
+ <td style="background-color: null"><p style="text-align: right">
1464
+ 75</p>
1465
+
1466
+ </td>
1467
+ <td style="background-color: null"><p style="text-align: right">
1468
+ 25.72</p>
1469
+
1470
+ </td>
1471
+ <td style="background-color: null"><p style="text-align: right">
1472
+ 0.13</p>
1473
+
1474
+ </td>
1475
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=cjson-cjson_parse/report/">Reports</a>
1476
+ </td>
1477
+ </tr>
1478
+ <tr>
1479
+ <td style="background-color: null">cjson
1480
+ </td>
1481
+ <td style="background-color: null">cjson_parsewithlength
1482
+ </td>
1483
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/cjson-cjson_parsewithlength/prompts.txt">Prompt</a>;
1484
+ <br>
1485
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=cjson-cjson_parsewithlength/fixes/">Fixes</a>;
1486
+ <br>
1487
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=cjson-cjson_parsewithlength/targets/">Targets</a>.
1488
+ </td>
1489
+ <td style="background-color: null"><p style="text-align: right">
1490
+ 62.5</p>
1491
+
1492
+ </td>
1493
+ <td style="background-color: null"><p style="text-align: right">
1494
+ 25.72</p>
1495
+
1496
+ </td>
1497
+ <td style="background-color: null"><p style="text-align: right">
1498
+ 0.13</p>
1499
+
1500
+ </td>
1501
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=cjson-cjson_parsewithlength/report/">Reports</a>
1502
+ </td>
1503
+ </tr>
1504
+ <tr>
1505
+ <td style="background-color: null">jsoncpp
1506
+ </td>
1507
+ <td style="background-color: null">json-value-removeindex
1508
+ </td>
1509
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/jsoncpp-json-value-removeindex/prompts.txt">Prompt</a>;
1510
+ <br>
1511
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=jsoncpp-json-value-removeindex/fixes/">Fixes</a>;
1512
+ <br>
1513
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=jsoncpp-json-value-removeindex/targets/">Targets</a>.
1514
+ </td>
1515
+ <td style="background-color: null"><p style="text-align: right">
1516
+ 25</p>
1517
+
1518
+ </td>
1519
+ <td style="background-color: null"><p style="text-align: right">
1520
+ 5.11</p>
1521
+
1522
+ </td>
1523
+ <td style="background-color: null"><p style="text-align: right">
1524
+ 0.13</p>
1525
+
1526
+ </td>
1527
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=jsoncpp-json-value-removeindex/report/">Reports</a>
1528
+ </td>
1529
+ </tr>
1530
+ <tr>
1531
+ <td style="background-color: null">libucl
1532
+ </td>
1533
+ <td style="background-color: null">ucl_object_merge
1534
+ </td>
1535
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/libucl-ucl_object_merge/prompts.txt">Prompt</a>;
1536
+ <br>
1537
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libucl-ucl_object_merge/fixes/">Fixes</a>;
1538
+ <br>
1539
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libucl-ucl_object_merge/targets/">Targets</a>.
1540
+ </td>
1541
+ <td style="background-color: null"><p style="text-align: right">
1542
+ 25</p>
1543
+
1544
+ </td>
1545
+ <td style="background-color: null"><p style="text-align: right">
1546
+ 0.65</p>
1547
+
1548
+ </td>
1549
+ <td style="background-color: null"><p style="text-align: right">
1550
+ 0.12</p>
1551
+
1552
+ </td>
1553
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libucl-ucl_object_merge/report/">Reports</a>
1554
+ </td>
1555
+ </tr>
1556
+ <tr>
1557
+ <td style="background-color: null">speex
1558
+ </td>
1559
+ <td style="background-color: null">ogg_stream_pageout_fill
1560
+ </td>
1561
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/speex-ogg_stream_pageout_fill/prompts.txt">Prompt</a>;
1562
+ <br>
1563
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=speex-ogg_stream_pageout_fill/fixes/">Fixes</a>;
1564
+ <br>
1565
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=speex-ogg_stream_pageout_fill/targets/">Targets</a>.
1566
+ </td>
1567
+ <td style="background-color: null"><p style="text-align: right">
1568
+ 6.25</p>
1569
+
1570
+ </td>
1571
+ <td style="background-color: null"><p style="text-align: right">
1572
+ 0</p>
1573
+
1574
+ </td>
1575
+ <td style="background-color: null"><p style="text-align: right">
1576
+ 0.07</p>
1577
+
1578
+ </td>
1579
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=speex-ogg_stream_pageout_fill/report/">Reports</a>
1580
+ </td>
1581
+ </tr>
1582
+ <tr>
1583
+ <td style="background-color: null">libsndfile
1584
+ </td>
1585
+ <td style="background-color: null">sf_command
1586
+ </td>
1587
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/libsndfile-sf_command/prompts.txt">Prompt</a>;
1588
+ <br>
1589
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libsndfile-sf_command/fixes/">Fixes</a>;
1590
+ <br>
1591
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libsndfile-sf_command/targets/">Targets</a>.
1592
+ </td>
1593
+ <td style="background-color: null"><p style="text-align: right">
1594
+ 25</p>
1595
+
1596
+ </td>
1597
+ <td style="background-color: null"><p style="text-align: right">
1598
+ 3.41</p>
1599
+
1600
+ </td>
1601
+ <td style="background-color: null"><p style="text-align: right">
1602
+ 0.06</p>
1603
+
1604
+ </td>
1605
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libsndfile-sf_command/report/">Reports</a>
1606
+ </td>
1607
+ </tr>
1608
+ <tr>
1609
+ <td style="background-color: null">mosquitto
1610
+ </td>
1611
+ <td style="background-color: null">mosquitto_topic_matches_sub
1612
+ </td>
1613
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/mosquitto-mosquitto_topic_matches_sub/prompts.txt">Prompt</a>;
1614
+ <br>
1615
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=mosquitto-mosquitto_topic_matches_sub/fixes/">Fixes</a>;
1616
+ <br>
1617
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=mosquitto-mosquitto_topic_matches_sub/targets/">Targets</a>.
1618
+ </td>
1619
+ <td style="background-color: null"><p style="text-align: right">
1620
+ 62.5</p>
1621
+
1622
+ </td>
1623
+ <td style="background-color: null"><p style="text-align: right">
1624
+ 4.03</p>
1625
+
1626
+ </td>
1627
+ <td style="background-color: null"><p style="text-align: right">
1628
+ 0.05</p>
1629
+
1630
+ </td>
1631
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=mosquitto-mosquitto_topic_matches_sub/report/">Reports</a>
1632
+ </td>
1633
+ </tr>
1634
+ <tr>
1635
+ <td style="background-color: null">libsndfile
1636
+ </td>
1637
+ <td style="background-color: null">sf_format_check
1638
+ </td>
1639
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/libsndfile-sf_format_check/prompts.txt">Prompt</a>;
1640
+ <br>
1641
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libsndfile-sf_format_check/fixes/">Fixes</a>;
1642
+ <br>
1643
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libsndfile-sf_format_check/targets/">Targets</a>.
1644
+ </td>
1645
+ <td style="background-color: null"><p style="text-align: right">
1646
+ 12.5</p>
1647
+
1648
+ </td>
1649
+ <td style="background-color: null"><p style="text-align: right">
1650
+ 0.1</p>
1651
+
1652
+ </td>
1653
+ <td style="background-color: null"><p style="text-align: right">
1654
+ 0.04</p>
1655
+
1656
+ </td>
1657
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libsndfile-sf_format_check/report/">Reports</a>
1658
+ </td>
1659
+ </tr>
1660
+ <tr>
1661
+ <td style="background-color: null">libucl
1662
+ </td>
1663
+ <td style="background-color: null">ucl_object_replace_key
1664
+ </td>
1665
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/libucl-ucl_object_replace_key/prompts.txt">Prompt</a>;
1666
+ <br>
1667
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libucl-ucl_object_replace_key/fixes/">Fixes</a>;
1668
+ <br>
1669
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libucl-ucl_object_replace_key/targets/">Targets</a>.
1670
+ </td>
1671
+ <td style="background-color: null"><p style="text-align: right">
1672
+ 50</p>
1673
+
1674
+ </td>
1675
+ <td style="background-color: null"><p style="text-align: right">
1676
+ 7.14</p>
1677
+
1678
+ </td>
1679
+ <td style="background-color: null"><p style="text-align: right">
1680
+ 0.04</p>
1681
+
1682
+ </td>
1683
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libucl-ucl_object_replace_key/report/">Reports</a>
1684
+ </td>
1685
+ </tr>
1686
+ <tr>
1687
+ <td style="background-color: null">libdwarf
1688
+ </td>
1689
+ <td style="background-color: null">dwarf_find_die_given_sig8
1690
+ </td>
1691
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/libdwarf-dwarf_find_die_given_sig8/prompts.txt">Prompt</a>;
1692
+ <br>
1693
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libdwarf-dwarf_find_die_given_sig8/fixes/">Fixes</a>;
1694
+ <br>
1695
+ <a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libdwarf-dwarf_find_die_given_sig8/targets/">Targets</a>.
1696
+ </td>
1697
+ <td style="background-color: null"><p style="text-align: right">
1698
+ 37.5</p>
1699
+
1700
+ </td>
1701
+ <td style="background-color: null"><p style="text-align: right">
1702
+ 11.62</p>
1703
+
1704
+ </td>
1705
+ <td style="background-color: null"><p style="text-align: right">
1706
+ 0.01</p>
1707
+
1708
+ </td>
1709
+ <td style="background-color: null"><a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html?prefix=libdwarf-dwarf_find_die_given_sig8/report/">Reports</a>
1710
+ </td>
1711
+ </tr>
1712
+ </table>
1713
+
1714
+
1715
+ <script>jtd.setTheme('wider');</script>
1716
+
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder-fuzzbench/fuzzbench_install_dependencies ADDED
@@ -0,0 +1,22 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #! /bin/bash -eux
2
+ # Copyright 2023 Google LLC
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+
18
+ apt-get update && apt-get install -y gcc gfortran python-dev libopenblas-dev liblapack-dev cython libpq-dev
19
+ wget -O /tmp/requirements.txt https://raw.githubusercontent.com/google/fuzzbench/master/requirements.txt
20
+ pip3 install pip --upgrade
21
+ CFLAGS= CXXFLAGS= pip3 install -r /tmp/requirements.txt
22
+ rm /tmp/requirements.txt
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/base-images/base-builder-swift/precompile_swift ADDED
@@ -0,0 +1,33 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash -eu
2
+ # Copyright 2021 Google LLC
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+
18
+ cp /usr/local/bin/llvm-symbolizer-swift $OUT/llvm-symbolizer
19
+
20
+ export SWIFTFLAGS="-Xswiftc -parse-as-library -Xswiftc -static-stdlib --static-swift-stdlib"
21
+ if [ "$SANITIZER" = "coverage" ]
22
+ then
23
+ export SWIFTFLAGS="$SWIFTFLAGS -Xswiftc -profile-generate -Xswiftc -profile-coverage-mapping -Xswiftc -sanitize=fuzzer"
24
+ else
25
+ export SWIFTFLAGS="$SWIFTFLAGS -Xswiftc -sanitize=fuzzer,$SANITIZER --sanitize=$SANITIZER"
26
+ for f in $CFLAGS; do
27
+ export SWIFTFLAGS="$SWIFTFLAGS -Xcc=$f"
28
+ done
29
+
30
+ for f in $CXXFLAGS; do
31
+ export SWIFTFLAGS="$SWIFTFLAGS -Xcxx=$f"
32
+ done
33
+ fi
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/filestore/filesystem/__init__.py ADDED
@@ -0,0 +1,107 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Copyright 2022 Google LLC
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ """Filestore implementation using a filesystem directory."""
15
+ import logging
16
+ import os
17
+ import shutil
18
+ import subprocess
19
+ import sys
20
+
21
+ from distutils import dir_util
22
+
23
+ # pylint: disable=wrong-import-position,import-error
24
+ sys.path.append(
25
+ os.path.join(os.path.dirname(os.path.abspath(__file__)), os.pardir,
26
+ os.pardir, os.pardir))
27
+ import filestore
28
+
29
+
30
+ def recursive_list_dir(directory):
31
+ """Returns list of all files in |directory|, including those in
32
+ subdirectories."""
33
+ files = []
34
+ for root, _, filenames in os.walk(directory):
35
+ for filename in filenames:
36
+ files.append(os.path.join(root, filename))
37
+ return files
38
+
39
+
40
+ class FilesystemFilestore(filestore.BaseFilestore):
41
+ """Filesystem implementation using a filesystem directory."""
42
+ BUILD_DIR = 'build'
43
+ CRASHES_DIR = 'crashes'
44
+ CORPUS_DIR = 'corpus'
45
+ COVERAGE_DIR = 'coverage'
46
+
47
+ def __init__(self, config):
48
+ super().__init__(config)
49
+ self._filestore_root_dir = self.config.platform_conf.filestore_root_dir
50
+
51
+ def _get_filestore_path(self, name, prefix_dir):
52
+ """Returns the filesystem path in the filestore for |name| and
53
+ |prefix_dir|."""
54
+ return os.path.join(self._filestore_root_dir, prefix_dir, name)
55
+
56
+ def _upload_directory(self, name, directory, prefix, delete=False):
57
+ filestore_path = self._get_filestore_path(name, prefix)
58
+ if os.path.exists(filestore_path):
59
+ initial_files = set(recursive_list_dir(filestore_path))
60
+ else:
61
+ initial_files = set()
62
+
63
+ # Make directory and any parents.
64
+ os.makedirs(filestore_path, exist_ok=True)
65
+ copied_files = set(dir_util.copy_tree(directory, filestore_path))
66
+ if not delete:
67
+ return True
68
+
69
+ files_to_delete = initial_files - copied_files
70
+ for file_path in files_to_delete:
71
+ os.remove(file_path)
72
+ return True
73
+
74
+ def _download_directory(self, name, dst_directory, prefix):
75
+ filestore_path = self._get_filestore_path(name, prefix)
76
+ return dir_util.copy_tree(filestore_path, dst_directory)
77
+
78
+ def upload_crashes(self, name, directory):
79
+ """Uploads the crashes at |directory| to |name|."""
80
+ return self._upload_directory(name, directory, self.CRASHES_DIR)
81
+
82
+ def upload_corpus(self, name, directory, replace=False):
83
+ """Uploads the crashes at |directory| to |name|."""
84
+ return self._upload_directory(name,
85
+ directory,
86
+ self.CORPUS_DIR,
87
+ delete=replace)
88
+
89
+ def upload_build(self, name, directory):
90
+ """Uploads the build located at |directory| to |name|."""
91
+ return self._upload_directory(name, directory, self.BUILD_DIR)
92
+
93
+ def upload_coverage(self, name, directory):
94
+ """Uploads the coverage report at |directory| to |name|."""
95
+ return self._upload_directory(name, directory, self.COVERAGE_DIR)
96
+
97
+ def download_corpus(self, name, dst_directory):
98
+ """Downloads the corpus located at |name| to |dst_directory|."""
99
+ return self._download_directory(name, dst_directory, self.CORPUS_DIR)
100
+
101
+ def download_build(self, name, dst_directory):
102
+ """Downloads the build with |name| to |dst_directory|."""
103
+ return self._download_directory(name, dst_directory, self.BUILD_DIR)
104
+
105
+ def download_coverage(self, name, dst_directory):
106
+ """Downloads the latest project coverage report."""
107
+ return self._download_directory(name, dst_directory, self.COVERAGE_DIR)
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/example_crash_fuzzer_bug_summary.txt ADDED
@@ -0,0 +1,68 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ AddressSanitizer: heap-buffer-overflow on address 0x62500001b530 at pc 0x00000052138a bp 0x7ffe62db2c10 sp 0x7ffe62db23d8
2
+ READ of size 52 at 0x62500001b530 thread T0
3
+ SCARINESS: 26 (multi-byte-read-heap-buffer-overflow)
4
+ #0 0x521389 in __asan_memcpy /src/llvm-project/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cpp:22:3
5
+ #1 0x567590 in yr_object_set_string /src/yara/libyara/object.c:1122:5
6
+ #2 0x5afced in dex_parse /src/yara/libyara/modules/dex/dex.c:781:5
7
+ #3 0x5b4a8b in dex__load /src/yara/libyara/modules/dex/dex.c:1218:7
8
+ #4 0x56537c in yr_modules_load /src/yara/libyara/modules.c:179:16
9
+ #5 0x5d6583 in yr_execute_code /src/yara/libyara/exec.c:1276:18
10
+ #6 0x56f5c0 in yr_scanner_scan_mem_blocks /src/yara/libyara/scanner.c:444:3
11
+ #7 0x56bf23 in yr_rules_scan_mem_blocks /src/yara/libyara/rules.c:235:12
12
+ #8 0x56c182 in yr_rules_scan_mem /src/yara/libyara/rules.c:285:10
13
+ #9 0x5548d2 in LLVMFuzzerTestOneInput /src/yara/tests/oss-fuzz/dex_fuzzer.cc:40:3
14
+ #10 0x45a3b1 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:556:15
15
+ #11 0x459ad5 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool*) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:470:3
16
+ #12 0x45be77 in fuzzer::Fuzzer::MutateAndTestOne() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:698:19
17
+ #13 0x45cc05 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:830:5
18
+ #14 0x44ac88 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:824:6
19
+ #15 0x474ab2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:19:10
20
+ #16 0x7f4409b7a82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
21
+ #17 0x41e348 in _start (out/dex_fuzzer+0x41e348)
22
+
23
+ 0x62500001b530 is located 0 bytes to the right of 9264-byte region [0x625000019100,0x62500001b530)
24
+ allocated by thread T0 here:
25
+ #0 0x521f4d in malloc /src/llvm-project/compiler-rt/lib/asan/asan_malloc_linux.cpp:145:3
26
+ #1 0x4331b7 in operator new(unsigned long) (out/dex_fuzzer+0x4331b7)
27
+ #2 0x459ad5 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool*) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:470:3
28
+ #3 0x45be77 in fuzzer::Fuzzer::MutateAndTestOne() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:698:19
29
+ #4 0x45cc05 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:830:5
30
+ #5 0x44ac88 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:824:6
31
+ #6 0x474ab2 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:19:10
32
+ #7 0x7f4409b7a82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
33
+
34
+ SUMMARY: AddressSanitizer: heap-buffer-overflow /src/llvm-project/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cpp:22:3 in __asan_memcpy
35
+ Shadow bytes around the buggy address:
36
+ 0x0c4a7fffb650: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
37
+ 0x0c4a7fffb660: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
38
+ 0x0c4a7fffb670: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
39
+ 0x0c4a7fffb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
40
+ 0x0c4a7fffb690: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
41
+ =>0x0c4a7fffb6a0: 00 00 00 00 00 00[fa]fa fa fa fa fa fa fa fa fa
42
+ 0x0c4a7fffb6b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
43
+ 0x0c4a7fffb6c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
44
+ 0x0c4a7fffb6d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
45
+ 0x0c4a7fffb6e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
46
+ 0x0c4a7fffb6f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
47
+
48
+ Shadow byte legend (one shadow byte represents 8 application bytes):
49
+ Addressable: 00
50
+ Partially addressable: 01 02 03 04 05 06 07
51
+ Heap left redzone: fa
52
+ Freed heap region: fd
53
+ Stack left redzone: f1
54
+ Stack mid redzone: f2
55
+ Stack right redzone: f3
56
+ Stack after return: f5
57
+ Stack use after scope: f8
58
+ Global redzone: f9
59
+ Global init order: f6
60
+ Poisoned by user: f7
61
+ Container overflow: fc
62
+ Array cookie: ac
63
+ Intra object redzone: bb
64
+ ASan internal: fe
65
+ Left alloca redzone: ca
66
+ Right alloca redzone: cb
67
+ Shadow gap: cc
68
+ ==12==ABORTING
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/cifuzz/test_data/external-project/my_api.h ADDED
@@ -0,0 +1,19 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ // Copyright 2020 Google LLC
2
+ //
3
+ // Licensed under the Apache License, Version 2.0 (the "License");
4
+ // you may not use this file except in compliance with the License.
5
+ // You may obtain a copy of the License at
6
+ //
7
+ // http://www.apache.org/licenses/LICENSE-2.0
8
+ //
9
+ // Unless required by applicable law or agreed to in writing, software
10
+ // distributed under the License is distributed on an "AS IS" BASIS,
11
+ // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ // See the License for the specific language governing permissions and
13
+ // limitations under the License.
14
+
15
+ // A library that does ... stuff.
16
+ // Serves as an example of good fuzz testing and OSS-Fuzz integration.
17
+ #include <string>
18
+
19
+ size_t DoStuff(const std::string &str);
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/tools/wycheproof/.gitignore ADDED
@@ -0,0 +1 @@
 
 
1
+ wycheproof.zip
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/tools/wycheproof/generate_job.py ADDED
@@ -0,0 +1,50 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/usr/bin/env python3
2
+ # Copyright 2022 Google LLC
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+ """Script for generating an OSS-Fuzz job for a wycheproof project."""
18
+ import sys
19
+
20
+
21
+ def main():
22
+ """Usage generate_job.py <project>."""
23
+ project = sys.argv[1]
24
+ print(f'Name: wycheproof_nosanitizer_{project}')
25
+ job_definition = f"""CUSTOM_BINARY = False
26
+ BAD_BUILD_CHECK = False
27
+ APP_NAME = WycheproofTarget.bash
28
+ THREAD_ALIVE_CHECK_INTERVAL = 10
29
+ TEST_TIMEOUT = 3600
30
+ CRASH_RETRIES = 1
31
+ AGGREGATE_COVERAGE = False
32
+ TESTCASE_COVERAGE = False
33
+ FILE_GITHUB_ISSUE = False
34
+ MANAGED = False
35
+ MAX_FUZZ_THREADS = 1
36
+ RELEASE_BUILD_BUCKET_PATH = gs://clusterfuzz-builds-wycheproof/{project}/{project}-none-([0-9]+).zip
37
+ PROJECT_NAME = {project}
38
+ SUMMARY_PREFIX = {project}
39
+ REVISION_VARS_URL = https://commondatastorage.googleapis.com/clusterfuzz-builds-wycheproof/{project}/{project}-none-%s.srcmap.json
40
+ FUZZ_LOGS_BUCKET = {project}-logs.clusterfuzz-external.appspot.com
41
+ CORPUS_BUCKET = {project}-corpus.clusterfuzz-external.appspot.com
42
+ QUARANTINE_BUCKET = {project}-quarantine.clusterfuzz-external.appspot.com
43
+ BACKUP_BUCKET = {project}-backup.clusterfuzz-external.appspot.com
44
+ AUTOMATIC_LABELS = Proj-{project},Engine-wycheproof
45
+ """
46
+ print(job_definition)
47
+
48
+
49
+ if __name__ == '__main__':
50
+ main()
local-test-tika-full-01-vuln_6/fuzz-tooling/infra/tools/wycheproof/package.bash ADDED
@@ -0,0 +1,18 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ #!/bin/bash
2
+ # Copyright 2022 Google LLC
3
+ #
4
+ # Licensed under the Apache License, Version 2.0 (the "License");
5
+ # you may not use this file except in compliance with the License.
6
+ # You may obtain a copy of the License at
7
+ #
8
+ # http://www.apache.org/licenses/LICENSE-2.0
9
+ #
10
+ # Unless required by applicable law or agreed to in writing, software
11
+ # distributed under the License is distributed on an "AS IS" BASIS,
12
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13
+ # See the License for the specific language governing permissions and
14
+ # limitations under the License.
15
+ #
16
+ ################################################################################
17
+ # Script for zipping ClusterFuzz's blackbox fuzzer for wycheproof.
18
+ zip wycheproof.zip run.py launcher.py