II.
LibraryProcess overview
Reference · livelib-process:security-research--fuzzing-campaign
fuzzing-campaign overview
Automated vulnerability discovery through coverage-guided fuzzing. Includes target preparation, harness development, corpus creation, campaign execution, and crash analysis using AFL++, libFuzzer, and OSS-Fuzz methodologies.
Attributes
displayName
fuzzing-campaign
description
Automated vulnerability discovery through coverage-guided fuzzing. Includes target preparation,
harness development, corpus creation, campaign execution, and crash analysis using AFL++, libFuzzer,
and OSS-Fuzz methodologies.
libraryPath
library/specializations/security-research/fuzzing-campaign.js
specialization
security-research
references
- - AFL++: https://aflplus.plus/ - libFuzzer: https://llvm.org/docs/LibFuzzer.html - OSS-Fuzz: https://github.com/google/oss-fuzz
example
const result = await orchestrate('specializations/security-research/fuzzing-campaign', {
projectName: 'Parser Fuzzing Campaign',
targetBinary: '/path/to/target',
fuzzingEngine: 'afl++',
seedCorpus: '/path/to/seeds'
});
usesAgents
- fuzzing-engineer
- security-report-writer
Outgoing edges
lib_applies_to_domain1
- domain:cybersecurity·DomainCybersecurity
lib_belongs_to_specialization1
- specialization:security-research·Specialization
lib_implements_workflow1
- workflow:vulnerability-management·Workflow
uses_agent2
- lib-agent:security-research--fuzzing-engineer·LibraryAgentfuzzing-engineer
- lib-agent:security-research--security-report-writer·LibraryAgentSecurity Report Writer Agent
Incoming edges
None.