oss-fuzz VS clusterfuzz

Compare oss-fuzz vs clusterfuzz and see what are their differences.

Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
oss-fuzz clusterfuzz
31 3
9,879 5,200
3.8% 0.7%
9.9 9.8
about 1 hour ago 2 days ago
Shell Python
Apache License 2.0 Apache License 2.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

oss-fuzz

Posts with mentions or reviews of oss-fuzz. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-03-29.

clusterfuzz

Posts with mentions or reviews of clusterfuzz. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-03-16.
  • Fuzzing Ladybird with tools from Google Project Zero
    2 projects | news.ycombinator.com | 16 Mar 2024
    https://github.com/google/clusterfuzz

    At least Chromium has integrated multiple different fuzzers into their regular development workflow and found lots of bugs even before going public.

  • An ex-Googler's guide to dev tools
    7 projects | news.ycombinator.com | 17 Jul 2022
    Then it is clear that the behavior of this for loop is either not important or not being tested. This could mean that the tests that you do have are not useful and can be deleted.

    > For most non-trivial software the possible state-space is enormous and we generally don't/can't test all of it. So "not testing the (full) behaviour of your application is the default for any test strategy", if we could we wouldn't have bugs... Last I checked most software (including Google's) has plenty of bugs.

    I have also used (setup, fixed findings) using https://google.github.io/clusterfuzz/ which uses coverage + properties to find bugs in the way C++ code handles pointers and other things.

    > The next question would be let's say I spend my time writing the tests to resolve this (could be a lot of work) is that time better spent vs. other things I could be doing? (i.e. what's the ROI)

    That is something that will depend largely on the team and the code you are on. If you are in experimental code that isn't in production, is there value to this? Likely not. If you are writing code that if it fails to parse some data correctly you'll have a huge headache trying to fix it? Likely yes.

    The SRE workbook goes over making these calculations.

    > Even ignoring that is there data to support that the quality of software where mutation testing was added improved measurably (e.g. less bugs files against the deployed product, better uptime, etc?)

    I know that there are studies that show that tests reduce bugs but I do not know of studies that say that higher test coverage reduces bugs.

    The goal of mutation testing isn't to drive up coverage though. It is to find out what cases are not being exercised and evaluating if they will cause a problem. For example mutation testing tools have picked up cases like this:

       if (debug) print("Got here!");
  • ClusterFuzz is a scalable fuzzing infrastructure
    1 project | news.ycombinator.com | 25 Apr 2022

What are some alternatives?

When comparing oss-fuzz and clusterfuzz you can also consider the following projects:

AFLplusplus - The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!

rules_js - High-performance Bazel rules for running Node.js tools and building JavaScript projects

fuzzilli - A JavaScript Engine Fuzzer

rules_pycross - Bazel + Python rules for cross-platform external dependencies

ffmpeg-libav-tutorial - FFmpeg libav tutorial - learn how media works from basic to transmuxing, transcoding and more. Translations: πŸ‡ΊπŸ‡Έ πŸ‡¨πŸ‡³ πŸ‡°πŸ‡· πŸ‡ͺπŸ‡Έ πŸ‡»πŸ‡³ πŸ‡§πŸ‡·

anchore-engine - A service that analyzes docker images and scans for vulnerabilities

libfuzzer - Thin interface for libFuzzer, an in-process, coverage-guided, evolutionary fuzzing engine.

peafl64 - Static Binary Instrumentation tool for Windows x64 executables

uafuzz - UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities

pyfuzzer - Fuzz test Python modules with libFuzzer

ffmpeg-tutorial - A set of tutorials that demonstrates how to write a video player based on FFmpeg

mutant - Automated code reviews via mutation testing - semantic code coverage.