1 // Copyright 2021 Code Intelligence GmbH 2 // 3 // Licensed under the Apache License, Version 2.0 (the "License"); 4 // you may not use this file except in compliance with the License. 5 // You may obtain a copy of the License at 6 // 7 // http://www.apache.org/licenses/LICENSE-2.0 8 // 9 // Unless required by applicable law or agreed to in writing, software 10 // distributed under the License is distributed on an "AS IS" BASIS, 11 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 12 // See the License for the specific language governing permissions and 13 // limitations under the License. 14 15 package com.example; 16 17 import com.code_intelligence.jazzer.api.FuzzedDataProvider; 18 import com.code_intelligence.jazzer.api.FuzzerSecurityIssueMedium; 19 import java.security.SecureRandom; 20 21 public class ExampleFuzzer { fuzzerInitialize()22 public static void fuzzerInitialize() { 23 // Optional initialization to be run before the first call to fuzzerTestOneInput. 24 } 25 fuzzerTestOneInput(FuzzedDataProvider data)26 public static void fuzzerTestOneInput(FuzzedDataProvider data) { 27 String input = data.consumeRemainingAsString(); 28 // Without the hook in ExampleFuzzerHooks.java, the value of random would change on every 29 // invocation, making it almost impossible to guess for the fuzzer. 30 long random = new SecureRandom().nextLong(); 31 if (input.startsWith("magicstring" + random) && input.length() > 30 32 && input.charAt(25) == 'C') { 33 mustNeverBeCalled(); 34 } 35 } 36 mustNeverBeCalled()37 private static void mustNeverBeCalled() { 38 throw new FuzzerSecurityIssueMedium("mustNeverBeCalled has been called"); 39 } 40 } 41