Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
16 commits
Select commit Hold shift + click to select a range
caee3bb
Add hancock to OSS-Fuzz (Python + Atheris fuzz targets)
0ai-Cyberviser Mar 27, 2026
31dd3a9
Fix hancock project: use compile_python_fuzzer, remove duplicate sheb…
Copilot Mar 27, 2026
0debf3e
Fix corpus dir glob pattern in build.sh
Copilot Mar 27, 2026
9193759
Fix hancock OSS-Fuzz integration: use compile_python_fuzzer, fix buil…
Copilot Mar 27, 2026
455c8e7
Merge pull request #2 from 0ai-Cyberviser/copilot/oss-fuzz-add-hancock
0ai-Cyberviser Mar 27, 2026
16a8842
Merge branch 'master' into copilot/manage-protected-branches
0ai-Cyberviser Mar 27, 2026
98ea2a3
Merge pull request #1 from 0ai-Cyberviser/copilot/manage-protected-br…
0ai-Cyberviser Mar 27, 2026
dd31339
Merge branch 'master' into master
0ai-Cyberviser Mar 27, 2026
69a2cd0
Merge branch 'google:master' into master
0ai-Cyberviser Mar 28, 2026
05283de
Fix hancock OSS-Fuzz integration: deduplicate build.sh and project.yaml
Copilot Mar 28, 2026
67fe5a6
Merge pull request #3 from 0ai-Cyberviser/copilot/oss-fuzz-integration
0ai-Cyberviser Mar 28, 2026
6ccbd6f
Merge branch 'google:master' into master
0ai-Cyberviser Mar 28, 2026
be2b288
Add security policy, Dependabot config, and update CodeQL to v3
Copilot Mar 28, 2026
fb932ac
Simplify SECURITY.md to use only GitHub Security Advisories
Copilot Mar 28, 2026
3a0857e
Merge pull request #4 from 0ai-Cyberviser/copilot/set-up-security-sca…
0ai-Cyberviser Mar 28, 2026
c2282b7
build(deps): bump the maven group across 8 directories with 12 updates
dependabot[bot] Mar 28, 2026
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
49 changes: 49 additions & 0 deletions .github/dependabot.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,49 @@
version: 2
updates:
# GitHub Actions
- package-ecosystem: "github-actions"
directory: "/"
schedule:
interval: "weekly"

# Python - infra CI
- package-ecosystem: "pip"
directory: "/infra/ci"
schedule:
interval: "weekly"

# Python - infra build functions
- package-ecosystem: "pip"
directory: "/infra/build/functions"
schedule:
interval: "weekly"

# Python - cifuzz
- package-ecosystem: "pip"
directory: "/infra/cifuzz"
schedule:
interval: "weekly"

# npm - cifuzz
- package-ecosystem: "npm"
directory: "/infra/cifuzz"
schedule:
interval: "weekly"

# Go - jcc
- package-ecosystem: "gomod"
directory: "/infra/base-images/base-builder/jcc"
schedule:
interval: "weekly"

# Go - gocoverage
- package-ecosystem: "gomod"
directory: "/infra/base-images/base-runner/gocoverage"
schedule:
interval: "weekly"

# Ruby - docs
- package-ecosystem: "bundler"
directory: "/docs"
schedule:
interval: "weekly"
26 changes: 5 additions & 21 deletions .github/workflows/codeql-analysis.yml
Original file line number Diff line number Diff line change
Expand Up @@ -5,9 +5,10 @@ on:
branches: [ master ]
paths: [infra/**, .github/**]
pull_request:
# The branches below must be a subset of the branches above
branches: [ master ]
paths: [infra/**, .github/**]
schedule:
- cron: '25 14 * * 3'

jobs:
analyze:
Expand All @@ -27,29 +28,12 @@ jobs:

# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@v2
uses: github/codeql-action/init@v3
with:
languages: python
# If you wish to specify custom queries, you can do so here or in a config file.
# By default, queries listed here will override any specified in a config file.
# Prefix the list here with "+" to use these queries and those in the config file.
# queries: ./path/to/local/query, your-org/your-repo/queries@main

# Autobuild attempts to build any compiled languages (C/C++, C#, or Java).
# If this step fails, then you should remove it and run the build manually (see below)
- name: Autobuild
uses: github/codeql-action/autobuild@v2

# ℹ️ Command-line programs to run using the OS shell.
# 📚 https://git.io/JvXDl

# ✏️ If the Autobuild fails above, remove it and uncomment the following three lines
# and modify them (or add more) to build your code if your project
# uses a compiled language

#- run: |
# make bootstrap
# make release
uses: github/codeql-action/autobuild@v3

- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v2
uses: github/codeql-action/analyze@v3
33 changes: 33 additions & 0 deletions SECURITY.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
# Security Policy

## Reporting a Vulnerability

If you discover a security vulnerability in this repository, please report it
responsibly. **Do not open a public issue.**

Please report vulnerabilities through
[GitHub Security Advisories](https://github.com/0ai-Cyberviser/oss-fuzz/security/advisories).
Click **"New draft security advisory"** and include as much detail as possible:

- A description of the vulnerability
- Steps to reproduce the issue
- Potential impact
- Suggested fix (if any)

## Scope

This policy applies to the infrastructure code in this repository (the `infra/`
directory, GitHub Actions workflows, and supporting tooling). Individual fuzzing
project configurations under `projects/` are maintained by their respective
upstream project owners.

## Response

We will acknowledge receipt of your report within **72 hours** and aim to
provide an initial assessment within **7 business days**. We will work with you
to understand and address the issue before any public disclosure.

## Supported Versions

Only the latest version of the code on the default branch is actively
maintained and receives security updates.
6 changes: 3 additions & 3 deletions projects/apache-cxf/project-parent/fuzz-targets/pom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -33,19 +33,19 @@
<dependency>
<groupId>org.apache.cxf</groupId>
<artifactId>cxf-core</artifactId>
<version>Fuzzing-SNAPSHOT</version>
<version>3.5.11</version>
</dependency>

<dependency>
<groupId>org.apache.cxf</groupId>
<artifactId>cxf-rt-frontend-jaxrs</artifactId>
<version>Fuzzing-SNAPSHOT</version>
<version>2.6.11</version>
</dependency>

<dependency>
<groupId>org.apache.cxf</groupId>
<artifactId>cxf-rt-transports-http</artifactId>
<version>Fuzzing-SNAPSHOT</version>
<version>3.1.16</version>
</dependency>

<dependency>
Expand Down
2 changes: 1 addition & 1 deletion projects/apache-tika/project-parent/fuzz-targets/pom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@
<dependency>
<groupId>org.apache.tika</groupId>
<artifactId>tika-core</artifactId>
<version>Fuzzing-SNAPSHOT</version>
<version>3.2.2</version>
</dependency>
<dependency>
<groupId>org.apache.tika</groupId>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@
<dependency>
<groupId>org.asynchttpclient</groupId>
<artifactId>async-http-client</artifactId>
<version>Fuzzing-SNAPSHOT</version>
<version>2.0.35</version>
</dependency>

<dependency>
Expand All @@ -46,7 +46,7 @@
<dependency>
<groupId>org.eclipse.jetty</groupId>
<artifactId>jetty-server</artifactId>
<version>11.0.14</version>
<version>11.0.24</version>
<scope>test</scope>
</dependency>

Expand Down
2 changes: 1 addition & 1 deletion projects/avro/project-parent/fuzz-targets/pom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@
<dependency>
<groupId>org.apache.avro</groupId>
<artifactId>avro</artifactId>
<version>Fuzzing-SNAPSHOT</version>
<version>1.11.4</version>
<scope>test</scope>
</dependency>

Expand Down
2 changes: 1 addition & 1 deletion projects/eclipse-equinox/equinox-fuzzer/pom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,7 @@
<dependency>
<groupId>org.eclipse.platform</groupId>
<artifactId>org.eclipse.core.runtime</artifactId>
<version>3.26.100</version>
<version>3.29.0</version>
</dependency>
</dependencies>

Expand Down
2 changes: 1 addition & 1 deletion projects/hadoop/project-parent/fuzz-targets/pom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@
<dependency>
<groupId>org.apache.hadoop</groupId>
<artifactId>hadoop-common</artifactId>
<version>Fuzzing-SNAPSHOT</version>
<version>3.4.0</version>
</dependency>

</dependencies>
Expand Down
21 changes: 21 additions & 0 deletions projects/hancock/Dockerfile
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
# Copyright 2026 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
################################################################################

FROM gcr.io/oss-fuzz-base/base-builder-python
RUN apt-get update && apt-get install -y python3-dev
RUN git clone --depth 1 https://github.com/0ai-Cyberviser/Hancock.git $SRC/hancock
WORKDIR $SRC/hancock
COPY build.sh $SRC/
30 changes: 30 additions & 0 deletions projects/hancock/build.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
#!/bin/bash -eu
# Copyright 2026 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
################################################################################

# Install project dependencies
pip3 install -r "$SRC/hancock/requirements.txt"

# Compile each Atheris fuzz target using the OSS-Fuzz Python helper
for fuzzer in $(find $SRC/hancock/fuzz -name 'fuzz_*.py'); do
compile_python_fuzzer "$fuzzer"
done

# Copy seed corpora.
for corpus_dir in $SRC/hancock/fuzz/corpus/*/; do
name=$(basename "$corpus_dir")
zip -j "$OUT/fuzz_${name}_seed_corpus.zip" "$corpus_dir"/* 2>/dev/null || true
done
11 changes: 11 additions & 0 deletions projects/hancock/project.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
homepage: "https://github.com/0ai-Cyberviser/Hancock"
language: python
primary_contact: "cyberviser@proton.me"
auto_ccs:
- "security@cyberviser.ai"
fuzzing_engines:
- libfuzzer
sanitizers:
- address
- undefined
main_repo: "https://github.com/0ai-Cyberviser/Hancock"
2 changes: 1 addition & 1 deletion projects/htmlunit/htmlunit-fuzzer/pom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@
<maven.compiler.source>15</maven.compiler.source>
<maven.compiler.target>15</maven.compiler.target>
<project.build.sourceEncoding>UTF-8</project.build.sourceEncoding>
<fuzzedLibaryVersion>2.7.0</fuzzedLibaryVersion>
<fuzzedLibaryVersion>3.9.0</fuzzedLibaryVersion>
<exec.mainClass>HtmlPageFuzzer</exec.mainClass>
</properties>
<dependencies>
Expand Down
6 changes: 3 additions & 3 deletions projects/jetty/project-parent/fuzz-targets/pom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -33,13 +33,13 @@
<dependency>
<groupId>org.eclipse.jetty</groupId>
<artifactId>jetty-http</artifactId>
<version>Fuzzing-SNAPSHOT</version>
<version>12.0.31</version>
</dependency>

<dependency>
<groupId>org.eclipse.jetty</groupId>
<artifactId>jetty-server</artifactId>
<version>Fuzzing-SNAPSHOT</version>
<version>9.4.56.v20240826</version>
</dependency>

<dependency>
Expand Down Expand Up @@ -86,7 +86,7 @@
<dependency>
<groupId>org.eclipse.jetty.http2</groupId>
<artifactId>http2-server</artifactId>
<version>Fuzzing-SNAPSHOT</version>
<version>9.4.53.v20231009</version>
<scope>test</scope>
</dependency>

Expand Down
Loading