Uh oh!
There was an error while loading.Please reload this page.
- Notifications
You must be signed in to change notification settings - Fork939
-
Hey@Byron 👋 Continuing on from#1887 (comment):
Considering the project's maintenance mode status and the issue backlog's community-driven nature, I can appreciate that. Those are important factors to consider when deciding what APIs are worth fuzzing; there's no sense in burying human user issues in a sea of weird fuzzer-generated edge cases. I'd like to get your perspective on that down the road.
Sure thing. I'd be happy to help with all things fuzz-related, including OSS-Fuzz issue triage and surfacing the available information to reproduce bugs in the GH issue tracker when appropriate. That said, in the interest of setting expectations:
Finally (for now), I have a few questions for you regarding next steps:
|
BetaWas this translation helpful?Give feedback.
All reactions
Replies: 5 comments 9 replies
-
Thanks for the summary, it's appreciated!
I understand, and communicating in discussions or issues will work for me.
Learning your motivation will be interesting :). My motivation to even take this on is to improve the correctness of the library, knowing that it will never be perfectly correct due to its sometimes hacky nature.
Please feel free to add yourself there and I shall try to approve such PR. Generally, since I won't fix security issues, it's best to have them in the open glaringly so the community steps up to fix it. While at it, I'd appreciate if you could add@EliahKagan to the CC list as well as he is definitely more competent in all of this, particularly in spotting security relevant issues.
Yes, please do. Putting it into a top-level
It's 60m per month? Oh my, last time I checked it was 30m and that was like a year ago! Thus, you will probably find the answer silly as there is no threat-model to speak of. Issues are raised, advisories are created, sometimes they are fixed, and that's already it. Generally, I don't think that GitPython ever has a chance to be correct enough not to be exploitable by merit of being written in Pythonand relying on command invocation a lot. Further, some code does read local files and it's definitely not en-par with similar code in Git, so could fall pray to all kinds of issues. But that's how it is, and I think the only real solution is to eventually get people to migrate to So maybe the threat-model is: Don't use GitPython? Use |
BetaWas this translation helpful?Give feedback.
All reactions
-
On another note, the |
BetaWas this translation helpful?Give feedback.
All reactions
-
I'm definitely happy to take a look but I can't promise I'll be very helpful on that specifically as I've mostly been playing with the C, Python and Go fuzzing so far and from what I've observed the rust builds are in a somewhat precarious state right now for a number of reasons, one of which being related togoogle/oss-fuzz#11626 and the complexity of an ongoing attempt to upgrade clang from 15 to 18 ingoogle/oss-fuzz#11714 |
BetaWas this translation helpful?Give feedback.
All reactions
-
Thanks for researching the issue and the PR, that's already helpful as I now know that it's not only |
BetaWas this translation helpful?Give feedback.
All reactions
-
I'm starting to take a peak at the
|
BetaWas this translation helpful?Give feedback.
All reactions
-
Thanks for taking a look! Regarding 1), I didn't do anything related to fuzzers recently, and I don't think this resolution could have been caused by my actions. Usually, OSS-fuzzing runs were rock-solid, no intermittent build failures. Interesting that the issue on the OSS-fuzz infrastructure isn't closed yet given that it seems to work again. But maybe it doesn't send notifications for this. |
BetaWas this translation helpful?Give feedback.
All reactions
👍 1
Uh oh!
There was an error while loading.Please reload this page.
Uh oh!
There was an error while loading.Please reload this page.
-
Right back at you!
👍
I can't promise "interesting" but if I'm able to provide enough context to dispel the possibility of unintentionally misrepresenting myself through unspoken assumptions, I'd consider that a success lol. Basically I just wanted to say: Beyond the obvious last point, that context is also relevant to how I ended up in this repo:
So when I came across OSS-Fuzz about two months ago, I figured working through the list of projects with broken builds would be a great way to make an impact in the OSS world and learn about fuzzing. So here I am 🙂
Heard. We can figure out the specifics of how best to cross that bridge if and when we get to it.
Absolutely. @EliahKagan, is that ok with you and does the email address on your profile work? (The issue tracker requires a Gmail address/Google account added to the OSS-Fuzz project config to allow authentication.)
Sounds good. A simple directory with a flat layout should be enough.
👍
As far as identifying interesting fuzz targets is concerned, that sounds like a pretty solid foundation to me!
|
BetaWas this translation helpful?Give feedback.
All reactions
-
Yes, that is okay with me. Either of the two email addresses given there are fine (and they are both Gmail addresses). Thanks! |
BetaWas this translation helpful?Give feedback.
All reactions
-
Initial migration PRs are ready for review: |
BetaWas this translation helpful?Give feedback.
All reactions
-
Thanks again for all your support on this,@Byron, it's been quite fun! Now that we're (hopefully) close to the finish line with the migration I wanted to ask for your thoughts on the optionalCIFuzz GitHub action. I see that gitoxide already has it so I'd imagine you're familiar with it to some degree. I think it could be a helpful addition to the PR checks, but I also recognize that it adds another moving part that may not be desired in this project. Do you have any interest in getting it set up? If you think it's worthwhile, I'm happy to get a PR up. |
BetaWas this translation helpful?Give feedback.
All reactions
-
Incase you didn't see this: ping@Byron |
BetaWas this translation helpful?Give feedback.
All reactions
-
Thanks for the ping, indeed I must have managed to archive the notification before acting on it. Initially I just wanted to say something akin to "Yes, go for it", but then I was wondering if the additional compute will be useful at all. For example, in the previous years, I don't think I ever heard of OSSFuzz finding anything, and bugs it can probably find many. If you think that the fuzz-tests will be extended to make that more likely, then please do feel free to add a fuzz action that uses the available time. Otherwise, it might be OK to skip it, but it's definitely your call. |
BetaWas this translation helpful?Give feedback.
All reactions
-
Thanks, that makes sense to me. I agree that until there is more fuzzer coverage, it's probably not the most useful use of resources; especially considering the unit tests for what is covered by the fuzzers do an effective job at regression testing in CI. I'll skip adding CI for the time being and raise the idea again if/when it has more benefit to offer. |
BetaWas this translation helpful?Give feedback.
All reactions
👍 1
-
I'm going to close this discussion as resolved now that the fuzzers have been migrated and the build issues have been resolved. New discussions can be opened as needed if anything else comes up. Thanks for all the support on this! |
BetaWas this translation helpful?Give feedback.