-
Notifications
You must be signed in to change notification settings - Fork 1.9k
[Hardening] Continuously fuzz all Firecracker guest-facing attack surfaces #737
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
The Rust Fuzzing Authority has a lot of resources that can help us get started with this. |
What is the timeline for this? I am new to rust but would like to try this fuzz testing. |
There's nobody working on this right now, so no timeline either. If you want to give it a shot, it's all yours. We do have some previous work here for A good first step might be to figure out how to run 1 fuzzing session against one category of attack surface, and then leave the continuous integration part for another step. |
Is that code somewhere available to grok? |
@konradwilk , not at this time. |
It would be worth investing some research into whether we could also gather memory leaks related results from the fuzzing process. |
Updating title/description to better reflect the path we're taking here. |
The team has made progress toward this task developing an initial fuzzy framework which test every night our main branch to search for regressions.
We will need additional work to cover the whole guest facing interface expanding such tests to the entire set of devices and mmds |
We have implemented continuous fuzzing in Firecracker in the course of 2023. It is currently private. |
Constantly run a fuzzer against guest facing attack surfaces, including the entire device model as well as the MMDS interface.
The text was updated successfully, but these errors were encountered: