Clone this repo:

Branches

  1. c7ee834 fuzzilli: Handle cases where js_in_process_fuzzer is launched without FDs by Giovanni Ortuño Urquidi · 2 hours ago main
  2. 6369c60 Add documentation for running local coverage for blackbox fuzzers by Dylan Jew · 6 hours ago
  3. 7a9f17d infra: Remove linux-afl-asan-rel builder. by Jon Toohill · 2 days ago
  4. 98dc899 spanification of libyuv_scale_fuzzer.cc and advance of RNG state preservation. by Daniel Angulo · 7 days ago
  5. a0b75ae Update fuzzing documentation to emphasize FuzzTest for new targets. by Jocelyn Tran · 7 days ago

Fuzzing in Chromium

go/chrome-fuzzing

Just got a bug report from ClusterFuzz?: If you want to reproduce a ClusterFuzz crash locally, see How to Reproduce a Crash from ClusterFuzz.

Fuzzing is an automated software testing technique that provides invalid, unexpected, or random data as inputs to a program to find bugs.

Why fuzz? Fuzzing finds thousands of security and stability issues before they reach users (see go/fuzzing-success). For more information about the benefits of fuzzing, see go/why-fuzz.

Where to fuzz? Fuzz code that parses, decodes, or manipulates input from untrusted sources, such as the web.

Getting started

In Chromium, you can create and submit fuzz targets that run continuously at scale on ClusterFuzz. Prefer FuzzTest for all new fuzz targets. Use libFuzzer only to maintain existing targets.

FuzzTest (recommended)

FuzzTest integrates with the gtest framework and tests code that accepts structured, typed inputs, such as int, std::string, std::vector, or custom classes.

libFuzzer (deprecated)

libFuzzer tests APIs that consume raw byte buffers, such as image decoders and JSON or XML parsers.

Advanced topics

Getting help

If you have questions or encounter issues,

  • email chrome-fuzzing-core@google.com or
  • file a bug using the Chrome > Security > Fuzzing component.

View dashboard and stats