Fuzzing Operations Skill
// Comprehensive fuzzing operations with AFL++, libFuzzer, and OSS-Fuzz integration
$ git log --oneline --stat
stars:384
forks:73
updated:March 4, 2026
SKILL.mdreadonly
SKILL.md Frontmatter
nameFuzzing Operations Skill
descriptionComprehensive fuzzing operations with AFL++, libFuzzer, and OSS-Fuzz integration
allowed-toolsBash,Read,Write,Edit,Glob,Grep
Fuzzing Operations Skill
Overview
This skill provides comprehensive fuzzing capabilities for automated vulnerability discovery using industry-standard fuzzing frameworks.
Capabilities
- Configure and launch AFL++ campaigns
- Build instrumented binaries with coverage
- Create and manage seed corpora
- Triage and deduplicate crash files
- Run afl-tmin and afl-cmin for minimization
- Monitor fuzzing progress and coverage
- Generate crash reproduction scripts
- Support libFuzzer and honggfuzz
Target Processes
- fuzzing-campaign.js
- security-tool-development.js
- vulnerability-research-workflow.js
Dependencies
- AFL++ (afl-fuzz, afl-gcc, afl-clang-fast)
- LLVM (for instrumentation)
- Sanitizers (ASAN, MSAN, UBSAN)
- libFuzzer (LLVM)
- honggfuzz (optional)
- Python for crash analysis scripts
Usage Context
This skill is essential for:
- Automated vulnerability discovery
- Coverage-guided fuzzing campaigns
- Crash triage and root cause analysis
- Harness development for fuzzing
- Integration with CI/CD security testing
Integration Notes
- Supports parallel fuzzing across multiple cores
- Can integrate with corpus management systems
- Generates reproducible crash test cases
- Supports various target types (binaries, libraries, protocols)
- Coverage reports in lcov/html format