| --- |
| layout: default |
| title: OSS-Fuzz |
| permalink: / |
| nav_order: 1 |
| has_children: true |
| has_toc: false |
| --- |
| |
| # OSS-Fuzz |
|
|
| [Fuzz testing] is a well-known technique for uncovering programming errors in |
| software. Many of these detectable errors, like [buffer overflow], can have |
| serious security implications. Google has found [thousands] of security |
| vulnerabilities and stability bugs by deploying [guided in-process fuzzing of |
| Chrome components], and we now want to share that service with the open source |
| community. |
|
|
| [Fuzz testing]: https://en.wikipedia.org/wiki/Fuzz_testing |
| [buffer overflow]: https://en.wikipedia.org/wiki/Buffer_overflow |
| [thousands]: https://bugs.chromium.org/p/chromium/issues/list?q=label%3AStability-LibFuzzer%2CStability-AFL%20-status%3ADuplicate%2CWontFix&can=1 |
| [guided in-process fuzzing of Chrome components]: https://security.googleblog.com/2016/08/guided-in-process-fuzzing-of-chrome.html |
|
|
| In cooperation with the [Core Infrastructure Initiative] and the [OpenSSF], |
| OSS-Fuzz aims to make common open source software more secure and stable by |
| combining modern fuzzing techniques with scalable, distributed execution. |
| Projects that do not qualify for OSS-Fuzz (e.g. closed source) can run their own |
| instances of [ClusterFuzz] or [ClusterFuzzLite]. |
|
|
| [Core Infrastructure Initiative]: https://www.coreinfrastructure.org/ |
| [OpenSSF]: https://www.openssf.org/ |
|
|
| We support the [libFuzzer], [AFL++], [Honggfuzz], and [Centipede] fuzzing engines in |
| combination with [Sanitizers], as well as [ClusterFuzz], a distributed fuzzer |
| execution environment and reporting tool. |
|
|
| [libFuzzer]: https://llvm.org/docs/LibFuzzer.html |
| [AFL++]: https://github.com/AFLplusplus/AFLplusplus |
| [Honggfuzz]: https://github.com/google/honggfuzz |
| [Centipede]: https://github.com/google/centipede |
| [Sanitizers]: https://github.com/google/sanitizers |
| [ClusterFuzz]: https://github.com/google/clusterfuzz |
| [ClusterFuzzLite]: https://google.github.io/clusterfuzzlite/ |
|
|
| Currently, OSS-Fuzz supports C/C++, Rust, Go, Python and Java/JVM code. Other |
| languages supported by [LLVM] may work too. OSS-Fuzz supports fuzzing x86_64 |
| and i386 builds. |
| |
| [LLVM]: https://llvm.org |
| |
| |
| ## Project history |
| OSS-Fuzz was launched in 2016 in response to the |
| [Heartbleed] vulnerability, discovered in [OpenSSL], one of the |
| most popular open source projects for encrypting web traffic. The vulnerability |
| had the potential to affect almost every internet user, yet was caused by a |
| relatively simple memory buffer overflow bug that could have been detected by |
| fuzzing—that is, by running the code on randomized inputs to intentionally cause |
| unexpected behaviors or crashes. At the time, though, fuzzing |
| was not widely used and was cumbersome for developers, requiring extensive |
| manual effort. |
| |
| Google created OSS-Fuzz to fill this gap: it's a free service that runs fuzzers |
| for open source projects and privately alerts developers to the bugs detected. |
| Since its launch, OSS-Fuzz has become a critical service for the open source |
| community, growing beyond C/C++ to |
| detect problems in memory-safe languages such as Go, Rust, and Python. |
| |
| [Heartbleed]: https://heartbleed.com/ |
| [OpenSSL]: https://www.openssl.org/ |
| |
| ## Learn more about fuzzing |
| |
| This documentation describes how to use OSS-Fuzz service for your open source |
| project. To learn more about fuzzing in general, we recommend reading [libFuzzer |
| tutorial] and the other docs in [google/fuzzing] repository. These and some |
| other resources are listed on the [useful links] page. |
| |
| [google/fuzzing]: https://github.com/google/fuzzing/tree/master/docs |
| [libFuzzer tutorial]: https://github.com/google/fuzzing/blob/master/tutorial/libFuzzerTutorial.md |
| [useful links]: {{ site.baseurl }}/reference/useful-links/#tutorials |
| |
| ## Trophies |
| As of August 2023, OSS-Fuzz has helped identify and fix over [10,000] vulnerabilities and [36,000] bugs across [1,000] projects. |
| |
| [10,000]: https://bugs.chromium.org/p/oss-fuzz/issues/list?q=Type%3DBug-Security%20label%3Aclusterfuzz%20-status%3ADuplicate%2CWontFix&can=1 |
| [36,000]: https://bugs.chromium.org/p/oss-fuzz/issues/list?q=Type%3DBug%20label%3Aclusterfuzz%20-status%3ADuplicate%2CWontFix&can=1 |
| [1,000]: https://github.com/google/oss-fuzz/tree/master/projects |
| |