diff options
author | kplybon <53794715+kplybon@users.noreply.github.com> | 2019-08-09 15:24:43 -0400 |
---|---|---|
committer | Abhishek Arya <inferno@chromium.org> | 2019-08-09 12:24:43 -0700 |
commit | d8af01c01630ce3d0aa405b0b5afe109330be313 (patch) | |
tree | d1ca6a33b336d4cc5f591b8b74024cd33a4cea0a /README.md | |
parent | 6922697fa1d93a613c8c2608dda180391388afca (diff) |
[Docs] Clarify fuzzing process and new projects procedure (#2673)
Diffstat (limited to 'README.md')
-rw-r--r-- | README.md | 5 |
1 files changed, 2 insertions, 3 deletions
@@ -2,9 +2,8 @@ [Fuzz testing](https://en.wikipedia.org/wiki/Fuzz_testing) is a well-known technique for uncovering programming errors in software. -Many of these detectable errors, like [buffer overflow](https://en.wikipedia.org/wiki/Buffer_overflow), can have serious security implications. Google found [hundreds](https://bugs.chromium.org/p/chromium/issues/list?can=1&q=label%3AStability-LibFuzzer+-status%3ADuplicate%2CWontFix) of security vulnerabilities and stability bugs by deploying -[guided in-process fuzzing of Chrome components](https://security.googleblog.com/2016/08/guided-in-process-fuzzing-of-chrome.html) -and, and we now want to share that service with the open source community. +Many of these detectable errors, like [buffer overflow](https://en.wikipedia.org/wiki/Buffer_overflow), can have serious security implications. Google has found [hundreds](https://bugs.chromium.org/p/chromium/issues/list?can=1&q=label%3AStability-LibFuzzer+-status%3ADuplicate%2CWontFix) of security vulnerabilities and stability bugs by deploying [guided in-process fuzzing of Chrome components](https://security.googleblog.com/2016/08/guided-in-process-fuzzing-of-chrome.html), +and we now want to share that service with the open source community. In cooperation with the [Core Infrastructure Initiative](https://www.coreinfrastructure.org/), OSS-Fuzz aims to make common open source software more secure and stable by |