
Jonathan Metzman
@metzmanj
I do fuzzing on Google's Open Source Security Team.
I work on OSS-Fuzz/ClusterFuzz/FuzzBench.
Speaking on behalf of myself, not my employer.
ID: 1088603370695225345
https://github.com/jonathanmetzman 25-01-2019 01:04:03
941 Tweet
1,1K Followers
500 Following



XBOW found a critical auth bypass (CVE-2024-50334) in a widely-used open-source Q&A site, fully autonomously! Nico Waisman and I wrote up a post walking through the methodology it used – IMO it's a super cool bug and fascinating trace



🤖 The latest in LLM-powered fuzzing from Google 26 new vulns so far, 1 in OpenSSL The LLM can draft a fuzz target, fix compilation issues, run it & fix runtime issues, & triage crashes New improvements & future work 👇 By Oliver Chang, Jonathan Metzman security.googleblog.com/2024/11/leveli…


📚 tl;dr sec 258 🤖 Google's AI-powered Fuzzing Oliver Chang, Jonathan Metzman ☁️ What Hackers know about your AWS Account Daniel Grzelak 🔬 Finding vulns in EDR Neodyme ☁️ How to use AWS Resource Control Policies Scott Piper 🤖 Augmenting SAST with AI and more! tldrsec.com/p/tldr-sec-258





#FUZZING'25 CALL FOR PAPERS ────── ✨ New OC members: Ruijie Meng (NUS) + Rohan Padhye (Rohan Padhye; CMU). ✨ New paper type: Fuzzing Nuggets (short papers). 🔗 fuzzingworkshop.github.io 📅 20. March (Submission) //cc @YannicNoller (RUB), László Szekeres (László Szekeres; Google)



