/* * Copyright 2023 Code Intelligence GmbH * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package com.example; import com.code_intelligence.jazzer.api.FuzzerSecurityIssueHigh; import java.io.OutputStream; import java.io.PrintStream; public class SilencedFuzzer { private static final PrintStream noopStream = new PrintStream(new OutputStream() { @Override public void write(int b) {} }); public static void fuzzerInitialize() { System.setErr(noopStream); System.setOut(noopStream); } public static void fuzzerTestOneInput(byte[] input) { // If the FuzzTargetTestWrapper successfully parses the stack trace emitted by this finding, we // know that the fuzzer still emitted output despite the fact that System.err and System.out // have been redirected above. throw new FuzzerSecurityIssueHigh(); } }