Create your own GitHub profile
Sign up for your own profile on GitHub, the best place to host code, manage projects, and build software alongside 50 million developers.
Sign up-
Adam@adalogics.com
- https://adalogics.com
Popular repositories
-
Forked from fluent/fluent-bit
Fast and Lightweight Log processor and forwarder for Linux, BSD and OSX
C
-
-
-
-
-
201 contributions in the last year
Contribution activity
May 2020
- AdamKorcz/hcl Go
- AdamKorcz/packer Go
- AdamKorcz/tidb Go
- AdamKorcz/uuid Go
- AdamKorcz/gnostic Go
- AdamKorcz/argo Go
- AdamKorcz/oss-fuzz C
- AdamKorcz/helm Go
- AdamKorcz/notary Go
- AdamKorcz/vitess Go
- AdamKorcz/Dragonfly Go
- AdamKorcz/mysql Go
- AdamKorcz/ferret Go
- AdamKorcz/micro-starter-kit Go
- AdamKorcz/cri-o Go
- AdamKorcz/leptonica C
- AdamKorcz/jsonparser Go
- AdamKorcz/go Go
- AdamKorcz/tesseract C++
- AdamKorcz/libarchive C
- AdamKorcz/mpc C
Created a pull request in pingcap/tidb that received 19 comments
types: Introduce fuzzing by adding 3 fuzzers
What problem does this PR solve? Issue Number: #318 Problem Summary: In above mentioned issue as well as here, interest has been expressed in doin…
+36
−0
•
19
comments
- [pix1.c] Added fuzzer
- [pageseg.c] Added fuzzer
- [recogbasic.c] Added fuzzer
- [pix4.c] Added fuzzer
- Added new fuzzer
- Used pixCopy on pixs2 instead of pixReadMemSpix
- Added new fuzzer
- Added new fuzzer
- Removed destroy function for cmap
- Added new fuzzer
- Added a target to pixa_recog_fuzzer
- Added new fuzzer
- Added more targets to colorquant_fuzzer
- Added seed corpus for all fuzzers
- Added seed corpus for barcode fuzzer
- Simplified pixa_recog_fuzzer
- Added libjbig back to build script
- Simplified pixa_recog_fuzzer
- Added new fuzzer
- Added new fuzzer
- Added new fuzzer
- Chmod'ed oss-fuzz-build
- [TiDB] initial integration
- [Minify] Initial integration
- [uuid] Initial integration
- [google-cloud-go] Initial integration
- [gnostic] Initial integration
- [Prometheus] Initial integration
- [grpc-gateway] Initial integration
- [vitess] Initial integration
- [dragonfly] initial integration
- [ferret] Initial integration
- [cascadia] initial integration
- [Tesseract] Updated build script to run from upstream
- [fastjson] Resubmitted for initial integration
- [go-env] Proposed project
- [jsonparser] Initial integration
- [fastjson] initial integration
- [haproxy] Updated contacts in project.yaml
- [Leptonica] Moved build script to Leptonicas repo
Created an issue in googleapis/google-cloud-go that received 2 comments
Spansql: Parser crash
This bug was found using a fuzzer that has been uploaded to oss-fuzz. Stack trace `panic: runtime error: slice bounds out of range [2:1] goroutine …
2
comments