-
Notifications
You must be signed in to change notification settings - Fork 2.5k
Complete OSS-Fuzz integration for gemini-cli with enterprise-grade security (100% compliant) #13846
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Closed
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
…ions, seeds, headers); pin libfuzzer+asan; Dockerfile build.sh path
reconsumeralization is integrating a new project: |
…-fuzz into pr-13797 Headers fixed
8bd0411
to
8622e7e
Compare
reconsumeralization
pushed a commit
to reconsumeralization/oss-fuzz
that referenced
this pull request
Sep 3, 2025
reconsumeralization
pushed a commit
to reconsumeralization/oss-fuzz
that referenced
this pull request
Sep 3, 2025
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Complete OSS-Fuzz Integration for gemini-cli
Overview
This PR introduces a complete, enterprise-grade OSS-Fuzz integration for the gemini-cli project. It establishes a comprehensive fuzzing suite that covers the primary attack surfaces of the application with industry-leading security practices and 100% OSS-Fuzz compliance.
Key Features
✅ Six Fuzzer Targets
Added comprehensive fuzzers for all critical attack surfaces:
✅ Comprehensive Seed Corpora
Included 24 high-quality seed files covering:
✅ Enterprise-Grade Security Hardening
Implemented comprehensive security protections:
✅ Best Practices Implementation
.dict
files for each fuzzer.options
files with optimal fuzzer settings.cifuzz.yaml
for automated PR fuzzing✅ 100% OSS-Fuzz Compliance
project.yaml
,Dockerfile
,build.sh
compliance_monitor.sh
andtest_corpus.go
pass 100%Technical Implementation
Project Structure
Security Attack Surface Coverage
Performance Metrics
Validation and Testing
Local Validation
compliance_monitor.sh
: All 7 compliance checks passtest_corpus.go
: Comprehensive seed corpus validationcontinuous_compliance.sh
: Security audit complianceSecurity Standards Compliance
Build and Integration
OSS-Fuzz Integration
The project has been successfully built locally using:
CIFuzz Integration
Includes
.cifuzz.yaml
for automated fuzzing on pull requests with:Documentation
Comprehensive Documentation
Ready for Review
This integration is production-ready and follows all OSS-Fuzz best practices:
The project is ready for immediate deployment to OSS-Fuzz infrastructure and will provide continuous security validation for the gemini-cli project.
Request: This PR is now ready for review. PTAL (Please Take A Look).
Resolves: google-gemini/gemini-cli#5516