aboutsummaryrefslogtreecommitdiffhomepage
diff options
context:
space:
mode:
-rw-r--r--docs/building_running_fuzzers.md2
-rw-r--r--docs/building_running_fuzzers_external.md2
-rw-r--r--docs/ideal_integration.md2
-rw-r--r--docs/new_target.md2
-rw-r--r--docs/reproducing.md2
5 files changed, 5 insertions, 5 deletions
diff --git a/docs/building_running_fuzzers.md b/docs/building_running_fuzzers.md
index 83268736..a136c020 100644
--- a/docs/building_running_fuzzers.md
+++ b/docs/building_running_fuzzers.md
@@ -28,7 +28,7 @@ docker run -ti -v /tmp/out:/out ossfuzz/<b><i>$target_name</i></b>
## Running Fuzzers
Fuzzers are statically linked executables and could be executed normally in Unbuntu-like environment.
-When Ubuntu environment is not available (or a restricted environment is desirable), the fuzzer can easly be run inside docker
+When Ubuntu environment is not available (or a restricted environment is desirable), the fuzzer can easily be run inside docker
container:
<pre>
diff --git a/docs/building_running_fuzzers_external.md b/docs/building_running_fuzzers_external.md
index 6752d5b0..5b0e95f7 100644
--- a/docs/building_running_fuzzers_external.md
+++ b/docs/building_running_fuzzers_external.md
@@ -48,7 +48,7 @@ INFO: Seed: 477892609
#4 NEW cov: 293 bits: 299 indir: 61 units: 4 exec/s: 0 L: 32 MS: 2 ChangeBit-EraseBytes-
```
-When Ubuntu environment is not aviable (or restricted environemnt is desirable), the fuzzer can easly be run inside docker
+When Ubuntu environment is not aviable (or restricted environment is desirable), the fuzzer can easily be run inside docker
container:
<pre>
diff --git a/docs/ideal_integration.md b/docs/ideal_integration.md
index 80554b70..b01110f0 100644
--- a/docs/ideal_integration.md
+++ b/docs/ideal_integration.md
@@ -97,7 +97,7 @@ and the project maintainers are not interested in helping.
In such cases we can host the fuzz targets, dictionaries, etc in this
repository and mention them in the Dockerfile.
Examples: [libxml2](../targets/libxml2), [c-ares](../targets/c-ares), [expat](../targets/expat).
-This is far from ideal because the fuzz targets will not be continuosly tested
+This is far from ideal because the fuzz targets will not be continuously tested
and hence may quickly bitrot.
If you are not a project maintainer we may not be able to CC you to security bugs found by OSS-Fuzz.
diff --git a/docs/new_target.md b/docs/new_target.md
index e8b0c7a2..cd3fc722 100644
--- a/docs/new_target.md
+++ b/docs/new_target.md
@@ -211,7 +211,7 @@ libfuzzerBuild {
}
```
-Simply replace the the "git" entry with the correct git url for the target.
+Simply replace the "git" entry with the correct git url for the target.
*Note*: only git is supported right now.
diff --git a/docs/reproducing.md b/docs/reproducing.md
index 35fc8a55..79985cac 100644
--- a/docs/reproducing.md
+++ b/docs/reproducing.md
@@ -63,7 +63,7 @@ docker run --rm -v <b><i>$target_checkout_dir</i></b>:/src/<b><i>$target</i></b
-v <b><i>$reproducer_file</i></b>:/testcase -t ossfuzz/<b><i>$target</i></b> reproduce <b><i>$fuzzer</i></b>
</pre>
- This is essentially the previous command that additonally mounts local sources into the running container.
+ This is essentially the previous command that additionally mounts local sources into the running container.
- *Fix the issue.* Use the previous command to verify you fixed the issue locally.
[Use gdb](debugging.md#debugging-fuzzers-with-gdb) if needed.
- *Submit the fix.* ClusterFuzz will automatically pick up the changes, recheck the testcase