1818
1919import com .code_intelligence .jazzer .api .FuzzerSecurityIssueHigh ;
2020import com .code_intelligence .jazzer .api .Jazzer ;
21- import java .io .*;
22- import java .util .*;
21+ import java .io .Closeable ;
22+ import java .io .File ;
23+ import java .io .Flushable ;
24+ import java .io .IOException ;
25+ import java .io .ObjectInputStream ;
26+ import java .io .Serializable ;
27+ import java .util .Arrays ;
28+ import java .util .Collection ;
29+ import java .util .Comparator ;
30+ import java .util .Iterator ;
31+ import java .util .List ;
32+ import java .util .ListIterator ;
2333import java .util .concurrent .Callable ;
2434import java .util .function .Function ;
2535
@@ -116,6 +126,7 @@ private static void reportFinding() {
116126 }
117127
118128 private static boolean isSanitizerEnabled (byte sanitizerId ) {
129+ // FIXME: This does not take into account disabled hooks set via CLI args or env.
119130 String allDisabledHooks = System .getProperty ("jazzer.disabled_hooks" );
120131 if (allDisabledHooks == null || allDisabledHooks .equals ("" )) {
121132 return true ;
@@ -132,7 +143,8 @@ private static boolean isSanitizerEnabled(byte sanitizerId) {
132143 default :
133144 sanitizer = "com.code_intelligence.jazzer.sanitizers.ReflectiveCall" ;
134145 }
135- return Arrays .stream (allDisabledHooks .split ("," )).noneMatch (sanitizer ::equals );
146+ return Arrays .stream (allDisabledHooks .split (String .valueOf (File .pathSeparatorChar )))
147+ .noneMatch (sanitizer ::equals );
136148 }
137149
138150 // Getter/Setter
0 commit comments