{"id":13538953,"url":"https://github.com/google/graphicsfuzz","last_synced_at":"2025-08-22T06:19:18.313Z","repository":{"id":33028635,"uuid":"150133859","full_name":"google/graphicsfuzz","owner":"google","description":"A testing framework for automatically finding and simplifying bugs in graphics shader compilers.","archived":false,"fork":false,"pushed_at":"2024-10-03T17:01:12.000Z","size":10149,"stargazers_count":594,"open_issues_count":104,"forks_count":115,"subscribers_count":22,"default_branch":"master","last_synced_at":"2025-08-19T18:57:31.003Z","etag":null,"topics":["fuzzing","glsl","opengl","spirv","vulkan"],"latest_commit_sha":null,"homepage":"","language":"Java","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/google.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":"CONTRIBUTING.md","funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":"CODEOWNERS","security":null,"support":null,"governance":null,"roadmap":null,"authors":"AUTHORS","dei":null,"publiccode":null,"codemeta":null}},"created_at":"2018-09-24T16:31:05.000Z","updated_at":"2025-08-13T11:19:13.000Z","dependencies_parsed_at":"2024-08-01T09:23:04.748Z","dependency_job_id":"ad336dd7-07d0-417f-8106-3781f8dc5020","html_url":"https://github.com/google/graphicsfuzz","commit_stats":null,"previous_names":[],"tags_count":92,"template":false,"template_full_name":null,"purl":"pkg:github/google/graphicsfuzz","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/google%2Fgraphicsfuzz","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/google%2Fgraphicsfuzz/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/google%2Fgraphicsfuzz/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/google%2Fgraphicsfuzz/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/google","download_url":"https://codeload.github.com/google/graphicsfuzz/tar.gz/refs/heads/master","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/google%2Fgraphicsfuzz/sbom","scorecard":{"id":437137,"data":{"date":"2025-08-11","repo":{"name":"github.com/google/graphicsfuzz","commit":"aa32d4cb556647ddaaf2048815bd6bca07d1bdab"},"scorecard":{"version":"v5.2.1-40-gf6ed084d","commit":"f6ed084d17c9236477efd66e5b258b9d4cc7b389"},"score":4.4,"checks":[{"name":"Code-Review","score":9,"reason":"Found 29/30 approved changesets -- score normalized to 9","details":null,"documentation":{"short":"Determines if the project requires human code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#code-review"}},{"name":"Maintained","score":0,"reason":"0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0","details":null,"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#maintained"}},{"name":"Packaging","score":-1,"reason":"packaging workflow not detected","details":["Warn: no GitHub/GitLab publishing workflow detected."],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#packaging"}},{"name":"Token-Permissions","score":0,"reason":"detected GitHub workflow tokens with excessive permissions","details":["Warn: no topLevel permission defined: .github/workflows/gfauto.yml:1","Warn: no topLevel permission defined: .github/workflows/graphicsfuzz.yml:1","Info: no jobLevel write permissions found"],"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#token-permissions"}},{"name":"Dangerous-Workflow","score":10,"reason":"no dangerous workflow patterns detected","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#dangerous-workflow"}},{"name":"CII-Best-Practices","score":0,"reason":"no effort to earn an OpenSSF best practices badge detected","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#cii-best-practices"}},{"name":"License","score":10,"reason":"license file detected","details":["Info: project has a license file: LICENSE:0","Info: FSF or OSI recognized license: Apache License 2.0: LICENSE:0"],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#license"}},{"name":"Binary-Artifacts","score":8,"reason":"binaries present in source code","details":["Warn: binary detected: gles-worker/gradle/wrapper/gradle-wrapper.jar:1","Warn: binary detected: vulkan-worker/gradle/wrapper/gradle-wrapper.jar:1"],"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#binary-artifacts"}},{"name":"Fuzzing","score":10,"reason":"project is fuzzed","details":["Info: OSSFuzz integration found","Info: CppLibFuzzer integration found: graphicsfuzz/src/main/scripts/examples/libFuzzer-integration/jni_fuzzer.cc:118","Info: CppLibFuzzer integration found: graphicsfuzz/src/main/scripts/examples/libFuzzer-integration/tcp_fuzzer.cc:125","Info: CppLibFuzzer integration found: graphicsfuzz/src/main/scripts/examples/libFuzzer-integration/jni_fuzzer.cc:118","Info: CppLibFuzzer integration found: graphicsfuzz/src/main/scripts/examples/libFuzzer-integration/tcp_fuzzer.cc:125"],"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#fuzzing"}},{"name":"Signed-Releases","score":0,"reason":"Project has not signed or included provenance with any releases.","details":["Warn: release artifact v1.3 not signed: https://api.github.com/repos/google/graphicsfuzz/releases/22114762","Warn: release artifact v1.2.1 not signed: https://api.github.com/repos/google/graphicsfuzz/releases/17420184","Warn: release artifact v1.2 not signed: https://api.github.com/repos/google/graphicsfuzz/releases/15952669","Warn: release artifact v1.1 not signed: https://api.github.com/repos/google/graphicsfuzz/releases/14627573","Warn: release artifact v1.0 not signed: https://api.github.com/repos/google/graphicsfuzz/releases/14286170","Warn: release artifact v1.3 does not have provenance: https://api.github.com/repos/google/graphicsfuzz/releases/22114762","Warn: release artifact v1.2.1 does not have provenance: https://api.github.com/repos/google/graphicsfuzz/releases/17420184","Warn: release artifact v1.2 does not have provenance: https://api.github.com/repos/google/graphicsfuzz/releases/15952669","Warn: release artifact v1.1 does not have provenance: https://api.github.com/repos/google/graphicsfuzz/releases/14627573","Warn: release artifact v1.0 does not have provenance: https://api.github.com/repos/google/graphicsfuzz/releases/14286170"],"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#signed-releases"}},{"name":"Branch-Protection","score":-1,"reason":"internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration","details":null,"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#branch-protection"}},{"name":"Security-Policy","score":10,"reason":"security policy file detected","details":["Info: security policy file detected: github.com/google/.github/SECURITY.md:1","Info: Found linked content: github.com/google/.github/SECURITY.md:1","Info: Found disclosure, vulnerability, and/or timelines in security policy: github.com/google/.github/SECURITY.md:1","Info: Found text in security policy: github.com/google/.github/SECURITY.md:1"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#security-policy"}},{"name":"Pinned-Dependencies","score":0,"reason":"dependency not pinned by hash detected -- score normalized to 0","details":["Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/gfauto.yml:41: update your workflow using https://app.stepsecurity.io/secureworkflow/google/graphicsfuzz/gfauto.yml/master?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/gfauto.yml:44: update your workflow using https://app.stepsecurity.io/secureworkflow/google/graphicsfuzz/gfauto.yml/master?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/graphicsfuzz.yml:44: update your workflow using https://app.stepsecurity.io/secureworkflow/google/graphicsfuzz/graphicsfuzz.yml/master?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/graphicsfuzz.yml:47: update your workflow using https://app.stepsecurity.io/secureworkflow/google/graphicsfuzz/graphicsfuzz.yml/master?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/graphicsfuzz.yml:53: update your workflow using https://app.stepsecurity.io/secureworkflow/google/graphicsfuzz/graphicsfuzz.yml/master?enable=pin","Warn: containerImage not pinned by hash: build/travis/docker-images/android-image.dockerfile:16: pin your Docker image by updating ubuntu:14.04 to ubuntu:14.04@sha256:64483f3496c1373bfd55348e88694d1c4d0c9b660dee6bfef5e12f43b9933b30","Warn: containerImage not pinned by hash: build/travis/docker-images/no-android-image.dockerfile:16: pin your Docker image by updating ubuntu:14.04 to ubuntu:14.04@sha256:64483f3496c1373bfd55348e88694d1c4d0c9b660dee6bfef5e12f43b9933b30","Warn: containerImage not pinned by hash: build/travis/docker-images/runner-image.dockerfile:16: pin your Docker image by updating paulthomson/graphicsfuzz-build:2019-01-11-a to paulthomson/graphicsfuzz-build:2019-01-11-a@sha256:47312dbe7ed9d9e8f54b260182c4e34a890003e636fa769c44aef1e6ca0d04e1","Info:   0 out of   5 GitHub-owned GitHubAction dependencies pinned","Info:   0 out of   3 containerImage dependencies pinned"],"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#pinned-dependencies"}},{"name":"SAST","score":0,"reason":"SAST tool is not run on all commits -- score normalized to 0","details":["Warn: 0 commits out of 29 are checked with a SAST tool"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#sast"}},{"name":"Vulnerabilities","score":0,"reason":"33 existing vulnerabilities detected","details":["Warn: Project is vulnerable to: PYSEC-2024-48 / GHSA-fj7x-q9j7-g6q6","Warn: Project is vulnerable to: PYSEC-2022-42986 / GHSA-43fp-rhv2-5gv8","Warn: Project is vulnerable to: PYSEC-2023-135 / GHSA-xqr8-7jwr-rhp7","Warn: Project is vulnerable to: PYSEC-2024-4 / GHSA-2mqj-m65w-jghx","Warn: Project is vulnerable to: PYSEC-2023-165 / GHSA-cwvm-v4w8-q58c","Warn: Project is vulnerable to: PYSEC-2022-42992 / GHSA-hcpj-qp55-gfph","Warn: Project is vulnerable to: PYSEC-2023-137 / GHSA-pr76-5cm5-w9cj","Warn: Project is vulnerable to: PYSEC-2023-161 / GHSA-wfm5-v35h-vwf4","Warn: Project is vulnerable to: GHSA-496j-2rq6-j6cc","Warn: Project is vulnerable to: PYSEC-2024-60 / GHSA-jjg7-2v4v-x38h","Warn: Project is vulnerable to: GHSA-29gw-9793-fvw7","Warn: Project is vulnerable to: PYSEC-2022-12 / GHSA-pq7m-3gw7-gq5x","Warn: Project is vulnerable to: PYSEC-2022-48 / GHSA-77rm-9x9h-xj3g","Warn: Project is vulnerable to: GHSA-8gq9-2x98-w8hf","Warn: Project is vulnerable to: GHSA-8qvm-5x2c-j2w7","Warn: Project is vulnerable to: PYSEC-2020-92 / GHSA-hj5v-574p-mj7c","Warn: Project is vulnerable to: PYSEC-2022-42969","Warn: Project is vulnerable to: PYSEC-2021-140 / GHSA-9w8r-397f-prfh","Warn: Project is vulnerable to: PYSEC-2023-117 / GHSA-mrwq-x4v8-fh7p","Warn: Project is vulnerable to: PYSEC-2021-141 / GHSA-pq64-v7f5-gqh8","Warn: Project is vulnerable to: PYSEC-2021-142 / GHSA-8q59-q68h-6hv4","Warn: Project is vulnerable to: GHSA-9hjg-9r4m-mvj7","Warn: Project is vulnerable to: GHSA-9wx4-h78v-vm56","Warn: Project is vulnerable to: PYSEC-2023-74 / GHSA-j8r2-6x86-q33q","Warn: Project is vulnerable to: GHSA-34jh-p97f-mpxf","Warn: Project is vulnerable to: PYSEC-2023-212 / GHSA-g4mx-q9vg-27p4","Warn: Project is vulnerable to: GHSA-pq67-6m6q-mj2v","Warn: Project is vulnerable to: PYSEC-2021-108 / GHSA-q2q7-5pp4-w6pg","Warn: Project is vulnerable to: PYSEC-2023-192 / GHSA-v845-jxx5-vc9f","Warn: Project is vulnerable to: GHSA-jfmj-5v4g-7637","Warn: Project is vulnerable to: GHSA-78wr-2p64-hpwj","Warn: Project is vulnerable to: GHSA-4265-ccf5-phj5","Warn: Project is vulnerable to: GHSA-4g9r-vxhx-9pgx"],"documentation":{"short":"Determines if the project has open, known unfixed vulnerabilities.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#vulnerabilities"}}]},"last_synced_at":"2025-08-19T04:57:17.105Z","repository_id":33028635,"created_at":"2025-08-19T04:57:17.105Z","updated_at":"2025-08-19T04:57:17.105Z"},"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":271538562,"owners_count":24777476,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-08-21T02:00:08.990Z","response_time":74,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["fuzzing","glsl","opengl","spirv","vulkan"],"created_at":"2024-08-01T09:01:18.150Z","updated_at":"2025-08-22T06:19:18.295Z","avatar_url":"https://github.com/google.png","language":"Java","readme":"# GraphicsFuzz\n\n[![License](https://img.shields.io/badge/License-Apache%202.0-blue.svg)](https://opensource.org/licenses/Apache-2.0)\n[![Build Status](https://github.com/google/graphicsfuzz/workflows/.github/workflows/graphicsfuzz.yml/badge.svg)](https://github.com/google/graphicsfuzz/actions)\n\n## GraphicsFuzz is a set of tools for testing shader compilers\n\nGraphicsFuzz provides tools for automatically finding and simplifying bugs in graphics drivers,\nspecifically graphics shader compilers. The glsl-fuzz and glsl-reduce tools manipulate GLSL shaders, targeting SPIR-V compilers via translation.\nThe spirv-fuzz and spirv-reduce tools directly manipulate SPIR-V shaders.\n\n## Download and run\n\nFollow the [gfauto README](https://github.com/google/graphicsfuzz/tree/master/gfauto#gfauto).\nThe [gfauto](https://github.com/google/graphicsfuzz/tree/master/gfauto#gfauto) command line\ntool is the\nrecommended way of automatically downloading and running our fuzzers to test Vulkan drivers in a \"push-button\" fashion with minimal interaction. See below if you want to read about\nindividual tools and/or use\nthem as standalone command line tools.\n\n\n## Tool documentation\n\n* **[gfauto](https://github.com/google/graphicsfuzz/tree/master/gfauto#gfauto)**: the recommended way of automatically downloading and running our fuzzers to test Vulkan drivers in a \"push-button\" fashion with minimal interaction\n* **glsl-fuzz**: a family of tools for testing GLSL shader compilers using randomized metamorphic testing\n* **glsl-reduce**: a stand-alone GLSL shader reducer\n* **spirv-fuzz**: a stand-alone SPIR-V shader fuzzer and shrinker that uses randomized metamorphic testing\n* **spirv-reduce**: a stand-alone SPIR-V shader reducer\n\n### glsl-fuzz\n\n* The glsl-fuzz tools are developed in this repo\n* [How it works (high-level): metamorphic testing using glsl-fuzz](docs/glsl-fuzz-intro.md)\n* [glsl-fuzz walkthrough](docs/glsl-fuzz-walkthrough.md)\n* [glsl-generate manual](docs/glsl-fuzz-generate.md)\n* [glsl-reduce manual (for reducing fuzzed shaders)](docs/glsl-fuzz-reduce.md)\n* **Pre-built binaries** are available on the [GitHub releases page of this repo](docs/glsl-fuzz-releases.md)\n* [**Developer documentation with build instructions**](docs/glsl-fuzz-develop.md)\n\n\n### glsl-reduce\n\n* glsl-reduce is developed in this repo\n* [Introduction: my shader is being weird, now what?](docs/glsl-reduce-intro.md)\n* [glsl-reduce walkthrough](docs/glsl-reduce-walkthrough.md)\n* [glsl-reduce manual](docs/glsl-reduce.md)\n* **Pre-built binaries** are available with glsl-fuzz on the [GitHub releases page of this repo](docs/glsl-fuzz-releases.md)\n\n### spirv-fuzz\n\n* spirv-fuzz is developed in the [SPIRV-Tools repo](https://github.com/KhronosGroup/SPIRV-Tools)\n* **[Nightly builds of SPIRV-Tools](https://github.com/google/gfbuild-SPIRV-Tools/releases)**\n* Try our [spirv-fuzz walkthrough](docs/finding-a-vulkan-driver-bug-using-spirv-fuzz.md) that can be run from your browser\n\n\n### spirv-reduce\n\n* spirv-reduce is developed in the [SPIRV-Tools repo](https://github.com/KhronosGroup/SPIRV-Tools)\n* **[Nightly builds of SPIRV-Tools](https://github.com/google/gfbuild-SPIRV-Tools/releases)**\n* Try our [spirv-fuzz walkthrough](docs/finding-a-vulkan-driver-bug-using-spirv-fuzz.md) (includes use of spirv-reduce) that can be run from your browser\n\n\n## Contribute\n\n* [Contributing (requires Google CLA)](CONTRIBUTING.md)\n* [License (Apache 2.0)](LICENSE)\n* [Developer documentation for glsl-fuzz](docs/glsl-fuzz-develop.md)\n\n## Further reading\n\n### GraphicsFuzz blog posts:\n\n* 17 January 2018: [Samsung Galaxy S8 (ARM, Qualcomm)](https://medium.com/@afd_icl/a-tale-of-two-samsungs-arm-vs-qualcomm-in-android-graphics-c1c6f1eef828)\n* 22 January 2018: [Nvidia Shield TV, Tablet (Nvidia)](https://medium.com/@afd_icl/nvidia-shield-reliable-graphics-2aa79e04e150)\n* 25 January 2018: [Google Pixel Phone 1, 2 (Qualcomm)](https://medium.com/@afd_icl/arm-gpus-in-huawei-phones-cb81280fbbab)\n* 5 February 2018: [Google Nexus Player (Imagination Technologies)](https://medium.com/@afd_icl/arm-gpus-in-huawei-phones-cb81280fbbab)\n* 15 February 2018: [Huawei Honor 9, 9 lite, 10 (ARM)](https://medium.com/@afd_icl/arm-gpus-in-huawei-phones-cb81280fbbab)\n* 22 February 2018: [Apple iPhone 6, 7, 8, X (Apple, Imagination Technologies)](https://medium.com/@afd_icl/an-apple-sandwich-449931ab4509)\n* 12 March 2018: [Samsung Galaxy S6, S7 (ARM, Qualcomm)](https://medium.com/@afd_icl/not-all-galaxies-are-made-equal-9812d6dcc0bb)\n* 22 May 2018: [Samsung Galaxy S9 (ARM, Qualcomm)](https://medium.com/@afd_icl/samsung-s9s-head-to-head-arm-vs-qualcomm-decf438eb255)\n\n### Academic research project blog posts:\n\n* 30 November 2016: [Intro](https://medium.com/@afd_icl/crashes-hangs-and-crazy-images-by-adding-zero-689d15ce922b)\n* 1 December 2016: [AMD](https://medium.com/@afd_icl/first-stop-amd-bluescreen-via-webgl-and-more-ba3eaf76c5fb)\n* 7 December 2016: [Apple](https://medium.com/@afd_icl/how-to-render-garbage-on-your-iphone-213fb577d67c)\n* 12 December 2016: [ARM](https://medium.com/@afd_icl/bugs-can-be-beautiful-65b93c5c58f9)\n* 15 December 2016: [Imagination Technologies](https://medium.com/@afd_icl/gpu-folks-we-need-to-talk-about-control-flow-c20fd225197e)\n* 20 December 2016: [Intel](https://medium.com/@afd_icl/intel-locking-up-safari-bluescreening-windows-135c1dc29495)\n* 25 January 2017: [Nvidia](https://medium.com/@afd_icl/nvidia-system-freeze-via-webgl-61a78cea1116)\n* 1 February 2017: [Qualcomm](https://medium.com/@afd_icl/hey-a-web-page-just-restarted-my-phone-c06d3db76542)\n\n### Academic publications:\n\n* OOPSLA 2017: [Automated Testing of Graphics Shader Compilers](http://multicore.doc.ic.ac.uk/publications/oopsla-17.html)\n* Metamorphic [Testing Workshop at ICSE 2016: Metamorphic Testing for (Graphics) Compilers](http://multicore.doc.ic.ac.uk/publications/met-16.html)\n\nThis is not an officially supported Google product.\n","funding_links":[],"categories":["\u003ca id=\"683b645c2162a1fce5f24ac2abfa1973\"\u003e\u003c/a\u003e漏洞\u0026\u0026漏洞管理\u0026\u0026漏洞发现/挖掘\u0026\u0026漏洞开发\u0026\u0026漏洞利用\u0026\u0026Fuzzing","Graphics"],"sub_categories":["功能"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fgoogle%2Fgraphicsfuzz","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fgoogle%2Fgraphicsfuzz","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fgoogle%2Fgraphicsfuzz/lists"}