Google announced this week that it has open sourced ClusterFuzz, the fuzzing infrastructure it built to help finding memory corruption bugs in Chrome.
The platform runs on over 25,000 cores and for two years has been available as a free service to open source projects through the OSS-Fuzz service.
An automated method for detecting bugs in software, fuzzing is effective only if continuous, done at scale, and integrated into the development process of a software project, and ClusterFuzz has been created specifically for that, Google says.
Created more than 8 years ago, ClusterFuzz provides end-to-end automation, including bug detection, deduplication, bisection, reporting, and closure of bug reports.
To date, the platform has found over 16,000 vulnerabilities in Chrome and more than 11,000 vulnerabilities across more than 160 open source projects integrated with OSS-Fuzz. With ClusterFuzz, bugs can be detected within hours after being introduced and the fix verified within a day, Google says.
Now available on GitHub, ClusterFuzz is highly scalable, provides accurate deduplication of crashes, testcase minimization, regression finding through bisection, and statistics for analyzing fuzzer performance and crash rates.
It also has an easy-to-use web interface for management and viewing crashes, and provides support for coverage guided fuzzing (e.g. libFuzzer and AFL) and blackbox fuzzing.
ClusterFuzz can be deployed locally on a compute cluster, although production use is reliant on some key Google Cloud Platform services.
Related: Google Wants More Projects Integrated With OSS-Fuzz

More from Ionut Arghire
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- 820k Impacted by Data Breach at Zacks Investment Research
- US Government Agencies Warn of Malicious Use of Remote Management Software
- Chinese Hackers Adopting Open Source ‘SparkRAT’ Tool
- CISA Provides Resources for Securing K-12 Education System
Latest News
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Cyberattacks Target Websites of German Airports, Admin
- US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
