lcamtuf-afl-documentation

Compare original and translation side by side

🇺🇸

Original

English
🇨🇳

Translation

Chinese

lcamtuf — American Fuzzy Lop (AFL) documentation (reference)

lcamtuf — American Fuzzy Lop (AFL) 文档(参考)

Educational routing only. This skill does not mirror the full site. Open the live pages for complete instructions, file lists, and any upstream notes.
仅用于学习指引。 本Skill不镜像完整站点。请打开在线页面以获取完整说明、文件列表及所有上游更新。

Canonical URL

官方URL

What it is

什么是AFL

AFL is a coverage-guided fuzzer aimed primarily at C/C++ binaries via compile-time instrumentation (e.g.
afl-gcc
/
afl-clang
/ LLVM modes) and the
afl-fuzz
driver. The published material on this site includes the original project narrative, quick-start style guidance, status screen semantics, and performance / tuning notes that many tutorials still cite.
Typical mental model for readers:
TopicRole
InstrumentationRebuild the target with AFL’s compilers/wrappers so edges are tracked.
Corpus & seedsStart from small valid inputs; AFL mutates and discovers new paths.
Fuzzing loop
afl-fuzz
runs; UI shows paths, crashes, hangs, stability—interpret per upstream docs.
CrashesTriaged as potential bugs; verify, minimize, report responsibly.
AFL是一款覆盖率引导的模糊测试工具,主要通过编译时插桩(如
afl-gcc
/
afl-clang
/ LLVM模式)和**
afl-fuzz
驱动程序针对C/C++**二进制文件进行测试。该站点发布的内容包括原始项目说明、快速入门指南、状态屏幕语义解释,以及许多教程仍在引用的性能调优说明。
读者通常的认知模型:
主题作用
插桩使用AFL的编译器/包装器重建目标程序,以便跟踪代码路径。
语料库与种子从小型有效输入开始;AFL会对其进行变异并发现新的代码路径。
模糊测试循环运行
afl-fuzz
;UI会显示路径、崩溃、挂起、稳定性等信息——需参考上游文档解读。
崩溃归类为潜在漏洞;需负责任地进行验证、简化和报告。

Modern fork (operational note)

现代分支(使用说明)

Active development of the AFL lineage for many teams is AFL++ (feature-rich fork, maintained tooling). Use this skill when the user explicitly wants lcamtuf’s classic page or historical AFL terminology; use AFL++ docs for current flags, compilers, and CI integration on new projects.
对于许多团队而言,AFL体系的活跃开发版本是**AFL++(功能丰富的分支,工具维护活跃)。当用户明确需要lcamtuf的经典页面或历史AFL术语时使用本Skill;若新项目需要当前的参数、编译器及CI集成相关内容,请使用AFL++**文档。

How to combine with blockint

与blockint的组合使用

NeedSkill
Solidity / EVM smart contract reviewevm-solidity-defi-triage-agent, defi-security-audit-agent
Solana / Rust program securitysolana-defi-vulnerability-analyst-agent, sealevel-attacks-solana
C/C++ native code in security researchlcamtuf-afl-documentation (AFL concepts) + project-specific build docs
需求Skill
Solidity / EVM智能合约审计evm-solidity-defi-triage-agentdefi-security-audit-agent
Solana / Rust程序安全solana-defi-vulnerability-analyst-agentsealevel-attacks-solana
安全研究中的C/C++原生代码lcamtuf-afl-documentation(AFL概念) + 项目特定构建文档

Guardrails

约束规则

  • Scope — Fuzz only systems you own or are explicitly authorized to test; follow program rules and laws.
  • Triaging — Not every crash is exploitable; confirm with debugging and vendor disclosure practice.
  • Stale tooling — Compare classic AFL behavior with current compiler and AFL++ release notes before production pipelines.
Goal: a stable pointer to lcamtuf.coredump.cx/afl for classic AFL documentation and terminology in security / fuzzing conversations.
  • 范围 — 仅对您拥有的系统或明确获授权测试的系统进行模糊测试;遵守项目规则和法律法规。
  • 问题分类 — 并非所有崩溃都可被利用;需通过调试和厂商披露规范进行确认。
  • 过时工具 — 在用于生产流水线前,请将经典AFL的行为与当前编译器及**AFL++**发行说明进行对比。
目标: 在安全/模糊测试相关讨论中,为经典AFL文档和术语提供稳定的指向链接**lcamtuf.coredump.cx/afl**。