Clone this repo:

Branches

  1. 254202e fuzzing: Format ChromiumMojoProfile according to Fuzzilli style by Tigran Bantikyan · 4 days ago main
  2. 21bde77 Remove use_afl GN arg and AFL_DRIVER_DONT_DEFER env var by Jon Toohill · 4 days ago
  3. 330e3d1 fuzzing: Update Mojo Fuzzilli profile's CodeGenerators and types by Tigran Bantikyan · 9 days ago
  4. 6ebde07 Update FuzzTest getting started guide by Jocelyn Tran · 2 weeks ago
  5. c7ee834 fuzzilli: Handle cases where js_in_process_fuzzer is launched without FDs by Giovanni Ortuño Urquidi · 3 weeks ago

Fuzzing in Chromium

go/chrome-fuzzing

Just got a bug report from ClusterFuzz?: If you want to reproduce a ClusterFuzz crash locally, see How to Reproduce a Crash from ClusterFuzz.

Fuzzing is an automated software testing technique that provides invalid, unexpected, or random data as inputs to a program to find bugs.

Why fuzz? Fuzzing finds thousands of security and stability issues before they reach users (see go/fuzzing-success). For more information about the benefits of fuzzing, see go/why-fuzz.

Where to fuzz? Fuzz code that parses, decodes, or manipulates input from untrusted sources, such as the web.

Getting started

In Chromium, you can create and submit fuzz targets that run continuously at scale on ClusterFuzz. Prefer FuzzTest for all new fuzz targets. Use libFuzzer only to maintain existing targets.

FuzzTest (recommended)

FuzzTest integrates with the gtest framework and tests code that accepts structured, typed inputs, such as int, std::string, std::vector, or custom classes.

libFuzzer (deprecated)

libFuzzer tests APIs that consume raw byte buffers, such as image decoders and JSON or XML parsers.

Advanced topics

Getting help

If you have questions or encounter issues,

  • email chrome-fuzzing-core@google.com or
  • file a bug using the Chrome > Security > Fuzzing component.

View dashboard and stats