lingo.lol is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for linguists, philologists, and other lovers of languages.

Server stats:

63
active users

#fuzzer

0 posts0 participants0 posts today
danzin<p>Do you maintain or contribute to a <a href="https://mastodon.social/tags/Python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Python</span></a> package that includes a C extension? Would you like to run a fuzzer against it?</p><p>If so, let me know and I will run it, or help you to get it running. </p><p>The fuzzer is <a href="https://mastodon.social/tags/fusil" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fusil</span></a>, which generates random code calling into your functions and methods. It's useful to check for crashes on invalid inputs or unexpected call patterns.</p><p>It has found about 50 crashes in <a href="https://mastodon.social/tags/CPython" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CPython</span></a>, 20 in <a href="https://mastodon.social/tags/PyPy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PyPy</span></a>, 6 in <a href="https://mastodon.social/tags/Numpy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Numpy</span></a> etc.</p><p><a href="https://mastodon.social/tags/fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzing</span></a> <a href="https://mastodon.social/tags/fuzzer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzer</span></a> <a href="https://mastodon.social/tags/testing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>testing</span></a><br>See here:<br><a href="https://github.com/devdanzin/fusil/issues/37" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/devdanzin/fusil/iss</span><span class="invisible">ues/37</span></a></p>
danzin<p>We're up to 30 <a href="https://mastodon.social/tags/CPython" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CPython</span></a> crashers found using <a href="https://mastodon.social/tags/Fusil" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fusil</span></a> this year, about 90% of them considered valid.</p><p>In 2008, I had reported 5 cases using the same <a href="https://mastodon.social/tags/fuzzer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzer</span></a>, 4 of which were release blockers.</p><p><span class="h-card" translate="no"><a href="https://mamot.fr/@vstinner" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>vstinner</span></a></span>, Fusil's creator, also reported a bunch of issues with it.</p><p>After running for a while (on free AWS and Oracle cloud tiers), crash hits are getting harder to find.</p><p>We need new fuzzing inputs. Feel free to suggest improvements that could find new crashers.</p><p><a href="https://github.com/devdanzin/fusil" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/devdanzin/fusil</span><span class="invisible"></span></a><br><a href="https://mastodon.social/tags/Python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Python</span></a> <a href="https://mastodon.social/tags/Fuzzing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fuzzing</span></a></p>
Giovanni Squillero<p>Whoa 🍾, cited by 100! <a href="https://sigmoid.social/tags/GP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GP</span></a> <a href="https://sigmoid.social/tags/EA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EA</span></a> <a href="https://sigmoid.social/tags/Fuzzer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fuzzer</span></a> <a href="https://scholar.google.com/citations?view_op=view_citation&amp;citation_for_view=99_kdAQAAAAJ:eQOLeE2rZwMC&amp;hl=en&amp;as_sdt=0,5&amp;authuser=1" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">scholar.google.com/citations?v</span><span class="invisible">iew_op=view_citation&amp;citation_for_view=99_kdAQAAAAJ:eQOLeE2rZwMC&amp;hl=en&amp;as_sdt=0,5&amp;authuser=1</span></a></p>
Benjamin Carr, Ph.D. 👨🏻‍💻🧬<p>Boffins from ETH Zurich have devised a novel <a href="https://hachyderm.io/tags/fuzzer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzer</span></a> for finding bugs in <a href="https://hachyderm.io/tags/RISCV" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RISCV</span></a> chips and have used it to find more than three dozen. <br>When applied to six actual RISC-V <a href="https://hachyderm.io/tags/CPU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CPU</span></a> – <a href="https://hachyderm.io/tags/VexRiscv" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VexRiscv</span></a>, <a href="https://hachyderm.io/tags/PicoRV32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PicoRV32</span></a>, <a href="https://hachyderm.io/tags/Kronos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kronos</span></a>, <a href="https://hachyderm.io/tags/CVA6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVA6</span></a>, Rocket, and BOOM – Cascade found 37 new bugs (translating to 29 <a href="https://hachyderm.io/tags/CVE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE</span></a>) in five of these six designs. <a href="https://www.theregister.com/2023/10/24/cascade_fuzzer_zurich/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2023/10/24/cas</span><span class="invisible">cade_fuzzer_zurich/</span></a></p>
Rob Ricci<p>Of all the super nuts things I have seen with <a href="https://discuss.systems/tags/ChatGPT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ChatGPT</span></a>, this is the most superly nuts-est, and I am seriously interested in what others think is going on here.</p><p>ChatGPT claims to have run my student Luciano's <a href="https://discuss.systems/tags/distributed" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>distributed</span></a> <a href="https://discuss.systems/tags/fuzzer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuzzer</span></a>. It claims to have *found a specific bug* in libpng, which we know is real. And it *suggested stuff to add to his README*.</p><p>The crazy thing about the bug it claims to have found is that this is the *same* bug Luciano found by actually running the fuzzer. That bug *is* in a CVE, but there is not anything up on the web indicating that *this* fuzzer can find *this* bug. ChatGPT even produces a nice summary of the bug (probably taken from the CVE). </p><p>So what's probably going on here? Did it actually run this fuzzer, interpret the crashes it found, and successfully connect them to a CVE? Seems amazing if true, but highly unlikely. Or did it find some other way to (correctly) guess what bug would be found? More plausible, but still pretty wild.</p><p>And it clearly did actually go through the github repo, which has only been online a few weeks, since it suggested expanding the README with stuff that is only in the library.</p><p>This is wild.</p><p><a href="https://twitter.com/cybergenik/status/1601868158297833473" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">twitter.com/cybergenik/status/</span><span class="invisible">1601868158297833473</span></a></p>