Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Propose recommendation around fuzzing #55

Open
codeboten opened this issue Jul 17, 2024 · 2 comments
Open

Propose recommendation around fuzzing #55

codeboten opened this issue Jul 17, 2024 · 2 comments

Comments

@codeboten
Copy link
Contributor

codeboten commented Jul 17, 2024

The CNCF has asked for a fuzzing audit of OpenTelemetry possibly using https://github.com/google/oss-fuzz. This issue is to capture the recommendation around fuzzing for the various SIGs in OTel

@jpkrohling
Copy link
Member

This is what we discussed during the SIG meeting:

  • The SIG Security is not ready to turn this into a recommendation, but believes there's value in having a practical experience with it
  • We believe that the Collector would be a good fit for this, with a small number of components initially. Namely, OTLP receiver and exporter.
  • We'll capture the learnings and see if we can scale this to other SIGs

mx-psi pushed a commit to open-telemetry/opentelemetry-collector that referenced this issue Jul 26, 2024
<!--Ex. Fixing a bug - Describe the bug and how this fixes the issue.
Ex. Adding a feature - Explain what this achieves.-->
#### Description

Adds fuzz tests for various unmarshaling routines.

This can be tested with `go test -fuzz=`

This is ongoing work for
open-telemetry/sig-security#55

<!-- Issue number if applicable -->
#### Link to tracking issue
Fixes #

<!--Describe what testing was performed and which tests were added.-->
#### Testing

<!--Describe the documentation added.-->
#### Documentation

<!--Please delete paragraphs that you did not use before submitting.-->

Signed-off-by: Adam Korczynski <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants