Victor Stinner wrote:
> I'm running regulary my fuzzer (Fusil) on CPython since summer 2008: I tested 
> Python 2.5, 2.6, 2.7, 3.0, 3.1 and 3.2. I'm only looking for "fatal errors": 
> Python process killed by a signal, or sometimes fuzzer timeouts. I ignore 
> most 
> timeout results because most of them are valid function calls reading 
> from/writing to a file or socket. My goal is to improve Python security: 
> protect it against malicious data injection and denial of service. I prefer 
> fuzzing to static code analyze because it finds few false positives and it 
> directly generate a script reproducing the crash. Fuzzing is just one tool 
> helping to improve the global security.

[CC to Stefan Behnel from the Cython project]

Thank you very much for all the work Victor!

Out of curiosity, can Fusil be used to check 3rd party extension as
well? I'd like to validate some extensions and library bindings I wrote
or that I'm using heavily at work. I'm especially interested in Cython
support: annotating the erroneous line of Cython code and getting the
shared library that causes the error to distinguish between my errors
and problems the wrapped libraries.

Christian
_______________________________________________
Python-Dev mailing list
Python-Dev@python.org
http://mail.python.org/mailman/listinfo/python-dev
Unsubscribe: 
http://mail.python.org/mailman/options/python-dev/archive%40mail-archive.com

Reply via email to