Summary
This episode explores fuzz testing in C++, a powerful technique for discovering bugs by generating random or mutated inputs. Jason demonstrates libFuzzer, a tool integrated with Clang that can be used as a sanitizer. Using a simple example of an unchecked string search function, he shows how fuzzers can quickly identify potential crashes by generating millions of test cases, including edge cases like empty strings. The tutorial explains how to set up libFuzzer, combine it with the Address Sanitizer, and leverage its genetic algorithm-based input generation to improve code reliability.
Related C++ Standard Sections
This episode covers topics found in these sections of the C++ standard:
-
[basic.string]40% match