blob: 4c3ed31b343bc9fd4cb0c66fc36c865b625ce460 [file] [log] [blame]
/*
* Copyright 2023 Code Intelligence GmbH
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package com.example;
import com.code_intelligence.jazzer.api.FuzzerSecurityIssueMedium;
import com.code_intelligence.jazzer.mutation.annotation.InRange;
import com.code_intelligence.jazzer.mutation.annotation.NotNull;
import com.code_intelligence.jazzer.protobuf.Proto2.TestProtobuf;
public class ExperimentalMutatorComplexProtoFuzzer {
public static void fuzzerTestOneInput(@NotNull TestProtobuf proto) {
if (proto.getI32() == 1234 && proto.getStr().equals("abcd")) {
throw new FuzzerSecurityIssueMedium("Secret proto is found!");
}
}
}