Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: Fuzz Unpack and reading of messages #186

Open
adamdecaf opened this issue Jul 22, 2022 · 0 comments
Open

feat: Fuzz Unpack and reading of messages #186

adamdecaf opened this issue Jul 22, 2022 · 0 comments

Comments

@adamdecaf
Copy link
Member

The reading and unpacking of messages consumes data from third-party sources. While this data is often from a trusted party it's still important to have parsers which do not crash on unexpected input. OWASP mentions that parsing of untrusted data is a major security risk software applications face.

Fuzzing is a testing methodology which generates inputs to execute all codepaths of a parser and discover crashes. We should fuzz the iso8583 parser and pack/unpack code.

Example for reading data:
https://github.com/moov-io/iso8583#parse-the-message-and-access-the-data

The Go standard library has support for fuzzing. We've previously used a third-party library for fuzzing, but with native support we should build a fuzzer using Go's toolchain.
Docs: https://go.dev/doc/fuzz/

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant