mirror of
https://github.com/FiloSottile/mkcert.git
synced 2026-04-25 05:26:03 +03:00
[GH-ISSUE #189] Suggestion: Continuous Fuzzing #120
Labels
No labels
TLS stack issue
Windows
bug
duplicate
duplicate
enhancement
help wanted
help wanted
pull-request
question
question
root store
waiting for info
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/mkcert#120
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @yevgenypats on GitHub (Aug 15, 2019).
Original GitHub issue: https://github.com/FiloSottile/mkcert/issues/189
Hi, I'm Yevgeny Pats Founder of Fuzzit - Continuous fuzzing as a service platform.
We have a free plan for OSS and I would be happy to contribute a PR if that's interesting.
The PR will include the following
You can see our basic example here and you can see an example of "in the wild" integration here.
Let me know if this is something worth working on.
Also, we have a reward program. If you are interested in implementing the fuzzers and the integration yourself I’ll be happy to reward you as well as to get unbiased feedback on how smooth the integration was.
Cheers,
Yevgeny
@FiloSottile commented on GitHub (Aug 16, 2019):
Hey, as the security coordinator of the Go project, I am always happy to see projects expanding the availability of fuzzing to the ecosystem, and the reward program looks interesting! But as the maintainer of mkcert, I should point out mkcert is not a good target for fuzzing, and you probably could have come to that conclusion by looking into it, so this feels a little spammy :)
@yevgenypats commented on GitHub (Aug 16, 2019):
Hi @FiloSottile thanks for the reply. I offered this because I saw that this is a popular and somewhat security related library. of course I cant deep dive into every project before offering free contribution as we are not Google yet:) It is indeed looks like not a great target for fuzzing though there might be a few functions that are somehow fuzzable. Anyway feel free to ping if you think this might relevant for this or other of your Go/Rust projects in the future.
Cheers,
Yevgeny