mirror of
https://github.com/nearai/ironclaw.git
synced 2026-05-06 13:40:51 +08:00
IronClaw Fuzz Targets
Fuzz testing for IronClaw code paths that depend on the full crate, using cargo-fuzz (libFuzzer).
Note: Safety-specific fuzz targets (sanitizer, validator, leak detector, credential detect) have moved to
crates/ironclaw_safety/fuzz/. See that directory's README for details.
Targets
| Target | What it exercises |
|---|---|
fuzz_tool_params |
Tool parameter and schema JSON validation |
Setup
cargo install cargo-fuzz
rustup install nightly
Running
# Run a specific target (runs until stopped or crash found)
cargo +nightly fuzz run fuzz_tool_params
# Run with a time limit (5 minutes)
cargo +nightly fuzz run fuzz_tool_params -- -max_total_time=300
Adding New Targets
- Create
fuzz/fuzz_targets/fuzz_<name>.rsfollowing the existing pattern - Add a
[[bin]]entry infuzz/Cargo.toml - Create
fuzz/corpus/fuzz_<name>/for seed inputs - Exercise real IronClaw code paths, not just generic serde
For safety-only targets, add them to crates/ironclaw_safety/fuzz/ instead.