Fabian Meumertzheim
Fabian Meumertzheim
While the error message we show is terrible, fingerprint protected credentials are irrecoverably lost after turning off the device lock. Can you create a new key via the UI?
Okay, we definitely need to handle this better. Unfortunately Keystore failures are not reported uniformly across devices, but we can at least do a bit better here.
I am able to reproduce this issue, but am still pretty clueless as to the root cause. I don't think there is anything obviously wrong in `FuzzedDataProvider`. I will take...
I can reproduce this even with `-len_control=0`, but it no longer reproduces with `-mutation_depth=100`. My best guess is that without any coverage feedback, a large input size can only be...
oss-fuzz requires you to add files to a directory next to your fuzz test: https://google.github.io/oss-fuzz/getting-started/new-project-guide/#seed-corpus. Usually, this is one by [downloading the corpus in the Dockerfile](https://github.com/google/oss-fuzz/blob/901fc681121a4e590487062ef46d5f4619b86da5/projects/apache-commons/Dockerfile#L35) and then [moving it...
We'll keep using OpenJDK 11 for now as a number of OSS libraries still aren't compatible with version 17.
Do you happen to know whether libFuzzer's fork mode reports ASan `halt_on_error=1` findings? That option served as the motivation for Jazzer's `--keep_going` mode and if it isn't well supported by...
I agree that the installation instructions for macOS were less than ideal. I don't own a macOS device myself and thus can't test binaries, but have improved the instructions in...
This problem was fixed in https://github.com/CodeIntelligenceTesting/jazzer/issues/116 by updating XCode. Could you give that a try?
Indeed, the current macro is mostly meant for regression testing within Jazzer. I am quite interested in proper rules_fuzzing though and will see what I can contribute to it.