lol

honggfuzz: init at 2.2

Honggfuzz is a security oriented, feedback-driven, evolutionary,
easy-to-use fuzzer with interesting analysis options. It is
multi-process and multi-threaded, blazingly fast when the persistent
fuzzing mode is used and has a solid track record of uncovered security
bugs.

See https://honggfuzz.dev for more information.

authored by

Daniel McCarney and committed by
Austin Seipp
9da69bcf 29cf4de2

+57
+10
maintainers/maintainer-list.nix
··· 1646 1646 githubId = 411324; 1647 1647 name = "Carles Pagès"; 1648 1648 }; 1649 + cpu = { 1650 + email = "daniel@binaryparadox.net"; 1651 + github = "cpu"; 1652 + githubId = 292650; 1653 + name = "Daniel McCarney"; 1654 + keys = [{ 1655 + longkeyid = "rsa2048/0x08FB2BFC470E75B4"; 1656 + fingerprint = "8026 D24A A966 BF9C D3CD CB3C 08FB 2BFC 470E 75B4"; 1657 + }]; 1658 + }; 1649 1659 craigem = { 1650 1660 email = "craige@mcwhirter.io"; 1651 1661 github = "craigem";
+45
pkgs/tools/security/honggfuzz/default.nix
··· 1 + { stdenv, fetchFromGitHub, callPackage, makeWrapper 2 + , clang, llvm, libbfd, libopcodes, libunwind, libblocksruntime 3 + }: 4 + 5 + let 6 + honggfuzz = stdenv.mkDerivation rec { 7 + pname = "honggfuzz"; 8 + version = "2.2"; 9 + 10 + src = fetchFromGitHub { 11 + owner = "google"; 12 + repo = pname; 13 + rev = "${version}"; 14 + sha256 = "0ycpx087mhv5s7w01chg2b6rfb3zgfpp9in0x73kpv7y4dcvg7gw"; 15 + }; 16 + enableParallelBuilding = true; 17 + 18 + nativeBuildInputs = [ makeWrapper ]; 19 + buildInputs = [ llvm ]; 20 + propagatedBuildInputs = [ libbfd libopcodes libunwind libblocksruntime ]; 21 + 22 + makeFlags = [ "PREFIX=$(out)" ]; 23 + 24 + meta = { 25 + description = "A security oriented, feedback-driven, evolutionary, easy-to-use fuzzer"; 26 + longDescription = '' 27 + Honggfuzz is a security oriented, feedback-driven, evolutionary, 28 + easy-to-use fuzzer with interesting analysis options. It is 29 + multi-process and multi-threaded, blazingly fast when the persistent 30 + fuzzing mode is used and has a solid track record of uncovered security 31 + bugs. 32 + 33 + Honggfuzz uses low-level interfaces to monitor processes and it will 34 + discover and report hijacked/ignored signals from crashes. Feed it 35 + a simple corpus directory (can even be empty for the feedback-driven 36 + fuzzing), and it will work its way up, expanding it by utilizing 37 + feedback-based coverage metrics. 38 + ''; 39 + homepage = "https://honggfuzz.dev/"; 40 + license = stdenv.lib.licenses.asl20; 41 + platforms = ["x86_64-linux"]; 42 + maintainers = with stdenv.lib.maintainers; [ cpu ]; 43 + }; 44 + }; 45 + in honggfuzz
+2
pkgs/top-level/all-packages.nix
··· 606 606 stdenv = clangStdenv; 607 607 }; 608 608 609 + honggfuzz = callPackage ../tools/security/honggfuzz { }; 610 + 609 611 aflplusplus = callPackage ../tools/security/aflplusplus { 610 612 clang = clang_9; 611 613 llvm = llvm_9;