Hacker Newsnew | past | comments | ask | show | jobs | submit | andrei's commentslogin

just link to the real thing :) [0]

[0]: https://twitter.com/nealagarwal/status/1747284257582506102


Such that it's already dead?


How is this different than just turning your TV off? I feel like I'm missing something


A lot of setups route audio through the TV so if you turn it off you turn off music / podcasts which a lot of people use to sleep. (including the author, as noted in the article)


Most televisions do not continue playing audio when they are turned off.

From the project page:

"That second paragraph hints at why this is important, despite the app’s simplicity."

and the second paragraph on the simulated display:

"Use this app when you want to listen to a podcast or music without seeing artwork or a screensaver."


facepalm I read that paragraph, but my brain skipped that sentence for some reason. Thanks for clarifying


tvOS allows you to play audio in the background - Blank allows you to blank the TV while still having the background audio playing from the speakers.


That’s the joke :)



As of go 1.18, fuzzing is built into the toolchain itself, and is what we're using in this post.

We go over the basics here [0], if you'd like to start at the beginning

[0]: https://blog.fuzzbuzz.io/go-fuzzing-basics/


Thanks!


Great, will take a look!


It's much more common than you may think - especially at larger organizations where engineers go "off-script" frequently.

That being said, we wanted to highlight an example of how fuzzing can be applied to a typical (albeit, toy) API to find logic bugs, and figured SQL Injection would be something that resonated with most (all?) developers.


It's fairly obvious that it's a contrived example, though, which means it's not much of a motivating example for fuzz testing. I'd think it'd help to have a non-obvious bug that's triggered by an unusual set of inputs; that would show the value of fuzz testing mich better. (Admittedly, this is easier said than done)

EDIT: I tried using fuzz testing to find the famous issue with integer overflows in binary search [1], but even when restricting the relevant type to uint8, a couple of minutes of fuzzing when running on gitpod.io didn't detect an issue. Repo is https://github.com/DylanSp/fuzzing-for-binary-search-overflo... if anyone wants to play around with it and see if they can get fuzzing to detect a problem. (Go doesn't panic on overflows; a different approach to creating the slice to search might reveal a logic error)

[1] https://ai.googleblog.com/2006/06/extra-extra-read-all-about...


A lot of folks we talk to think fuzzing is only useful for finding memory leaks in C++ programs, so we wanted to show how adding a single fuzz test to your API can find SQL injection and other logic bugs.

Would love to hear others' experience with Go fuzzing now that it's been out for a few months.


Fuzzing network protocol is a good usecase.


Fuzzing everything is absolutely essential imo.


> 2. What measures is Oven taking to proactively detect and mitigate vulnerabilities? (e.g.: fuzzing, audits, bug bounties)

We're huge fans of bun at Fuzzbuzz (waiting for it to get a bit more production-ready). If Jarred's interested, we'd be happy to donate some compute to support fuzzing Bun.

<hn username> @ fuzzbuzz.io


I've heard this talked about before, and I believe there's a phrase for it, but I don't remember. Do you happen to know?



Good catch :) fixed!


It does! Fuzzing actually started off as a tool built by security researchers to find vulnerabilities in parsers, and other complex codebases, usually written in C/C++ (looking for memory bugs). So anything that deals with untrusted binary data is a prime candidate for fuzz testing.

Go’s fuzzing framework supports `[]byte` arguments as well as all of the standard Go primitives, so you should be able to test netcode this way.

If you're looking for a C/C++ solution, my recommendation is libfuzzer [0]. We've also built our own C/C++ fuzzing engine at Fuzzbuzz [1].

[0] https://llvm.org/docs/LibFuzzer.html

[1] https://docs.fuzzbuzz.io/docs/getting-started-in-c-or-c++


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: