1 /* 2 * Copyright 2023 Code Intelligence GmbH 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17 package com.example; 18 19 import com.code_intelligence.jazzer.api.FuzzerSecurityIssueHigh; 20 import java.io.OutputStream; 21 import java.io.PrintStream; 22 23 public class SilencedFuzzer { 24 private static final PrintStream noopStream = new PrintStream(new OutputStream() { 25 @Override 26 public void write(int b) {} 27 }); 28 fuzzerInitialize()29 public static void fuzzerInitialize() { 30 System.setErr(noopStream); 31 System.setOut(noopStream); 32 } 33 fuzzerTestOneInput(byte[] input)34 public static void fuzzerTestOneInput(byte[] input) { 35 // If the FuzzTargetTestWrapper successfully parses the stack trace emitted by this finding, we 36 // know that the fuzzer still emitted output despite the fact that System.err and System.out 37 // have been redirected above. 38 throw new FuzzerSecurityIssueHigh(); 39 } 40 } 41