A self-hosted Fuzzing-As-A-Service platform
Перейти к файлу
Noah McGregor Harper 82fffbe8ad
Add `coverage_stats` metric to inner loop to increase output. (#3607)
* add

* Adding coverage output to every iteration of coverage task.

* Updating calls.

* Removing seen_input check.
2023-10-31 14:19:19 -07:00
.devcontainer Use language features. (#3456) 2023-08-25 13:36:36 -07:00
.github Support for retention policies on containers (#3501) 2023-10-03 11:51:41 -07:00
contrib Support custom ado fields that mark work items as duplicate (#3467) 2023-10-03 11:51:39 -07:00
docs Updating Ubuntu 20.04 to Ubuntu 22.04 for OneFuzz defaults (#3570) 2023-10-23 14:56:55 -07:00
src Add `coverage_stats` metric to inner loop to increase output. (#3607) 2023-10-31 14:19:19 -07:00
.gitattributes Migrate from winapi to windows-rs (#3050) 2023-08-08 21:13:42 +00:00
.gitignore Rework events (#3069) 2023-04-27 20:10:39 +00:00
CHANGELOG.md Release 8.9.0 (#3558) 2023-10-09 13:42:34 -07:00
CODE_OF_CONDUCT.md Initial CODE_OF_CONDUCT.md commit 2020-07-27 15:23:42 -07:00
CONTRIBUTING.md updating deploy.py to push dotnet by default (#1888) 2022-05-04 18:44:27 +00:00
CURRENT_VERSION Add a `GetExpand` trait for initializing `Expand` objects in our tasks (#3553) 2023-10-19 13:10:34 -07:00
LICENSE Initial LICENSE commit 2020-07-27 15:23:43 -07:00
README.md Update archive notice. (#3507) 2023-10-03 11:51:41 -07:00
SECURITY.md Initial SECURITY.md commit 2020-07-27 15:23:46 -07:00
codecov.yml Basic codecov config (#3290) 2023-07-13 06:01:24 -07:00
global.json Use global.json to specify .NET version (#3007) 2023-04-11 01:29:34 +00:00

README.md

OneFuzz

IMPORTANT NOTICE

August 31, 2023.

Since September 2020 when OneFuzz was first open sourced, weve been on a journey to create a best-in-class orchestrator for running fuzzers, driving security and quality into our products.

Initially launched by a small group in MSR, OneFuzz has now become a significant internal platform within Microsoft. As such, we are regretfully archiving the project to focus our attention on becoming a more deeply integrated service within the company. Unfortunately, we arent a large enough team to live in both the open-source world and the internal Microsoft world with its own unique set of requirements.

Our current plan is to archive the project in the next few months. That means well still be making updates for a little while. Of course, even after its archived, youll still be able to fork it and make the changes you need. Once weve decided on a specific date for archiving, well update this readme.

Thanks for taking the journey with us.

The OneFuzz team.


Update: September 15 2023: Our current target to archive the project is September 30th, 2023.


Onefuzz build status

A self-hosted Fuzzing-As-A-Service platform

Project OneFuzz enables continuous developer-driven fuzzing to proactively harden software prior to release. With a single command, which can be baked into CICD, developers can launch fuzz jobs from a few virtual machines to thousands of cores.

Features

  • Composable fuzzing workflows: Open source allows users to onboard their own fuzzers, swap instrumentation, and manage seed inputs.
  • Built-in ensemble fuzzing: By default, fuzzers work as a team to share strengths, swapping inputs of interest between fuzzing technologies.
  • Programmatic triage and result de-duplication: It provides unique flaw cases that always reproduce.
  • On-demand live-debugging of found crashes: It lets you summon a live debugging session on-demand or from your build system.
  • Observable and Debug-able: Transparent design allows introspection into every stage.
  • Fuzz on Windows and Linux: Multi-platform by design. Fuzz using your own OS build, kernel, or nested hypervisor.
  • Crash reporting notification callbacks: Including Azure DevOps Work Items and Microsoft Teams messages

For information, check out some of our guides:

Are you a Microsoft employee interested in fuzzing? Join us on Teams at Fuzzing @ Microsoft.

Contributing

This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.microsoft.com.

When you submit a pull request, a CLA-bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., label, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repositories using our CLA.

This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.

Data Collection

The software may collect information about you and your use of the software and send it to Microsoft. Microsoft may use this information to provide services and improve our products and services. You may turn off the telemetry as described in the repository. There are also some features in the software that may enable you and Microsoft to collect data from users of your applications. If you use these features, you must comply with applicable law, including providing appropriate notices to users of your applications together with a copy of Microsoft's privacy statement. Our privacy statement is located at https://go.microsoft.com/fwlink/?LinkID=824704. You can learn more about data collection and use in the help documentation and our privacy statement. Your use of the software operates as your consent to these practices.

For more information:

Reporting Security Issues

Security issues and bugs should be reported privately to the Microsoft Security Response Center (MSRC). For more information, please see SECURITY.md.