iiRecord
Agentic AI Atlas · Fuzzing Campaign
workflow:fuzzing-campaigna5c.ai
II.
Workflow JSON

workflow:fuzzing-campaign

Structured · live

Fuzzing Campaign json

Inspect the normalized record payload exactly as the atlas UI reads it.

File · workflows/workflows/workflows-security-research-deep.yamlCluster · workflows
Record JSON
{
  "id": "workflow:fuzzing-campaign",
  "_kind": "Workflow",
  "_file": "workflows/workflows/workflows-security-research-deep.yaml",
  "_cluster": "workflows",
  "attributes": {
    "displayName": "Fuzzing Campaign",
    "workflowKind": "security",
    "triggerType": "scheduled",
    "typicalCadence": "per-release",
    "complexity": "single-team",
    "description": "Plans and executes automated fuzz testing campaigns against critical code\npaths -- selecting fuzzing engines (AFL++, libFuzzer, Jazzer), writing\nharnesses for target functions, seeding initial corpora, running continuous\nfuzzing for a defined window, triaging unique crashes by exploitability,\nreporting confirmed vulnerabilities with reproducer inputs, and tracking\nregression via corpus integration into CI. Excludes fix implementation.\n"
  },
  "outgoingEdges": [
    {
      "from": "workflow:fuzzing-campaign",
      "to": "role:security-reviewer",
      "kind": "involves_role",
      "attributes": {}
    },
    {
      "from": "workflow:fuzzing-campaign",
      "to": "role:test-writer",
      "kind": "involves_role",
      "attributes": {}
    },
    {
      "from": "workflow:fuzzing-campaign",
      "to": "role:debugger",
      "kind": "involves_role",
      "attributes": {}
    },
    {
      "from": "workflow:fuzzing-campaign",
      "to": "skill-area:fuzz-testing",
      "kind": "requires_skill_area",
      "attributes": {}
    },
    {
      "from": "workflow:fuzzing-campaign",
      "to": "skill-area:sast",
      "kind": "requires_skill_area",
      "attributes": {}
    },
    {
      "from": "workflow:fuzzing-campaign",
      "to": "domain:cybersecurity",
      "kind": "applies_to_domain",
      "attributes": {}
    },
    {
      "from": "workflow:fuzzing-campaign",
      "to": "domain:software-engineering",
      "kind": "applies_to_domain",
      "attributes": {}
    },
    {
      "from": "workflow:fuzzing-campaign",
      "to": "responsibility:run-security-scans",
      "kind": "triggers_responsibility",
      "attributes": {}
    },
    {
      "from": "workflow:fuzzing-campaign",
      "to": "responsibility:triage-incoming-issues",
      "kind": "triggers_responsibility",
      "attributes": {}
    },
    {
      "from": "workflow:fuzzing-campaign",
      "to": "org-unit:security-team",
      "kind": "performed_by_org_unit",
      "attributes": {}
    },
    {
      "from": "workflow:fuzzing-campaign",
      "to": "org-unit:quality-engineering",
      "kind": "performed_by_org_unit",
      "attributes": {}
    }
  ],
  "incomingEdges": []
}