Add Github Action: OneFuzz #10630

Closed
opened 2026-01-31 02:26:07 +00:00 by claunia · 6 comments
Owner

Originally created by @WSLUser on GitHub (Sep 15, 2020).

Description of the new feature/enhancement

https://www.microsoft.com/security/blog/2020/09/15/microsoft-onefuzz-framework-open-source-developer-tool-fix-bugs/

What was once attached—at great expense—can now be baked into continuous build systems through:

Crash detection, once attached via tools such as Electric Fence, can be baked in with asan.
Coverage tracking, once attached via tools such as iDNA, Dynamo Rio, and Pin can be baked in with sancov.
Input harnessing, once accomplished via custom I/O harnesses, can be baked in with libfuzzer’s LLVMFuzzerTestOneInput function prototype.

Proposed technical implementation details (optional)

It's already being used internally by Windows. As this is a MS project, this should be able to be easily adopted. Source code will be published at https://github.com/microsoft/onefuzz during CppCon 2020.

Originally created by @WSLUser on GitHub (Sep 15, 2020). <!-- 🚨🚨🚨🚨🚨🚨🚨🚨🚨🚨 I ACKNOWLEDGE THE FOLLOWING BEFORE PROCEEDING: 1. If I delete this entire template and go my own path, the core team may close my issue without further explanation or engagement. 2. If I list multiple bugs/concerns in this one issue, the core team may close my issue without further explanation or engagement. 3. If I write an issue that has many duplicates, the core team may close my issue without further explanation or engagement (and without necessarily spending time to find the exact duplicate ID number). 4. If I leave the title incomplete when filing the issue, the core team may close my issue without further explanation or engagement. 5. If I file something completely blank in the body, the core team may close my issue without further explanation or engagement. All good? Then proceed! --> # Description of the new feature/enhancement https://www.microsoft.com/security/blog/2020/09/15/microsoft-onefuzz-framework-open-source-developer-tool-fix-bugs/ > What was once attached—at great expense—can now be baked into continuous build systems through: > > Crash detection, once attached via tools such as Electric Fence, can be baked in with asan. > Coverage tracking, once attached via tools such as iDNA, Dynamo Rio, and Pin can be baked in with sancov. > Input harnessing, once accomplished via custom I/O harnesses, can be baked in with libfuzzer’s LLVMFuzzerTestOneInput function prototype. <!-- A clear and concise description of what the problem is that the new feature would solve. Describe why and how a user would use this new functionality (if applicable). --> # Proposed technical implementation details (optional) It's already being used internally by Windows. As this is a MS project, this should be able to be easily adopted. Source code will be published at https://github.com/microsoft/onefuzz during CppCon 2020. <!-- A clear and concise description of what you want to happen. -->
claunia added the Issue-FeatureNeeds-TriageNeeds-Tag-FixTracking-External labels 2026-01-31 02:26:07 +00:00
Author
Owner

@DHowett commented on GitHub (Sep 15, 2020):

Thanks for looking out for us! We're already engaged with this team internally. 😄 I'm gonna close this one out until our/their investigation comes to a close.

@DHowett commented on GitHub (Sep 15, 2020): Thanks for looking out for us! We're already engaged with this team internally. :smile: I'm gonna close this one out until our/their investigation comes to a close.
Author
Owner

@WSLUser commented on GitHub (Sep 15, 2020):

Great, hope we'll see it show up in the public repo. It'll be interesting to see what it shows for the Console.

@WSLUser commented on GitHub (Sep 15, 2020): Great, hope we'll see it show up in the public repo. It'll be interesting to see what it shows for the Console.
Author
Owner

@DHowett commented on GitHub (Sep 15, 2020):

You may be happy to know we've already got a fuzzer for our whole VT stack. That's one of the biggest/most important targets, since all application output goes through it.

@DHowett commented on GitHub (Sep 15, 2020): You may be happy to know we've already _got_ a fuzzer for our whole VT stack. That's one of the biggest/most important targets, since all application output goes through it.
Author
Owner
@DHowett commented on GitHub (Sep 15, 2020): https://github.com/microsoft/terminal/tree/master/src/terminal/parser/ft_fuzzer and https://github.com/microsoft/terminal/tree/master/src/terminal/parser/ft_fuzzwrapper
Author
Owner

@WSLUser commented on GitHub (Sep 15, 2020):

Yes, I'm hoping/thinking the OneFuzz will replace those.

@WSLUser commented on GitHub (Sep 15, 2020): Yes, I'm hoping/thinking the OneFuzz will replace those.
Author
Owner

@DHowett commented on GitHub (Sep 15, 2020):

Based on our discussions with them, their work will build on our existing test cases but replace the fuzzing driver.

@DHowett commented on GitHub (Sep 15, 2020): Based on our discussions with them, their work will build on our existing test cases but replace the fuzzing driver.
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: starred/terminal#10630