Fabian Meumertzheim

Results 1648 comments of Fabian Meumertzheim

While the error message we show is terrible, fingerprint protected credentials are irrecoverably lost after turning off the device lock. Can you create a new key via the UI?

Okay, we definitely need to handle this better. Unfortunately Keystore failures are not reported uniformly across devices, but we can at least do a bit better here.

I am able to reproduce this issue, but am still pretty clueless as to the root cause. I don't think there is anything obviously wrong in `FuzzedDataProvider`. I will take...

I can reproduce this even with `-len_control=0`, but it no longer reproduces with `-mutation_depth=100`. My best guess is that without any coverage feedback, a large input size can only be...

oss-fuzz requires you to add files to a directory next to your fuzz test: https://google.github.io/oss-fuzz/getting-started/new-project-guide/#seed-corpus. Usually, this is one by [downloading the corpus in the Dockerfile](https://github.com/google/oss-fuzz/blob/901fc681121a4e590487062ef46d5f4619b86da5/projects/apache-commons/Dockerfile#L35) and then [moving it...

We'll keep using OpenJDK 11 for now as a number of OSS libraries still aren't compatible with version 17.

Do you happen to know whether libFuzzer's fork mode reports ASan `halt_on_error=1` findings? That option served as the motivation for Jazzer's `--keep_going` mode and if it isn't well supported by...

I agree that the installation instructions for macOS were less than ideal. I don't own a macOS device myself and thus can't test binaries, but have improved the instructions in...

This problem was fixed in https://github.com/CodeIntelligenceTesting/jazzer/issues/116 by updating XCode. Could you give that a try?

Indeed, the current macro is mostly meant for regression testing within Jazzer. I am quite interested in proper rules_fuzzing though and will see what I can contribute to it.