Max Dymond
Max Dymond
I've had a look at the UT fuzzing; it looks like the fnmatch code was done pretty hackily (copy a header file into a shared folder). What I might propose...
Immediate comment - I'm mildly terrified about adding another 2000 files to this repo, but I don't know if that's FUD or not.
> For each harness there's a few "seed" cases with human-readable names, plus some more inputs obtained through fuzzing, with hash-like filenames. We can probably remove the latter and let...
Hi @4br3mm0rd! In general this isn't natively set up for AFL. This uses libfuzzer to do all the bits it needs to do. We support compiling against a LIB_FUZZING_ENGINE as...
I wouldn't say it's impossible to be fuzzed. We don't have any explicit targets for it, but `socks5h://` triggers SOCKS5 behaviour in libcurl, which means that the general fuzzer ought...
I can check it out when I get back off holiday. I thought we'd get it for free because of the socks5:// protocol, but maybe there's other reasons why it...
Commenting to stay in the loop - I want to use this crate in https://github.com/cmeister2/remote-package but it uses an outdated zstd, which is causing some issues. EDIT: I forked this...
From my perspective I don't really mind where we go from here. I forked this to https://github.com/cmeister2/fez , updated the dependencies as far as I could in limited time and...
Happy to give people collaborative permissions on `fez` - pretty sure I'm up to date on all the dependabot issues now. Obviously would be cleaner if there was a separate...
Happy to join the org, don't appear to have any invites in my email though. Doesn't solve the package name issue though. On Tue, 19 Jul 2022, 16:56 Soc Virnyl...