Skip to content
This repository was archived by the owner on Jul 22, 2020. It is now read-only.

Commit 5be6d81

Browse files
author
Yevgeny Pats
committed
remove unnessary steps
1 parent bebafd8 commit 5be6d81

File tree

1 file changed

+0
-12
lines changed

1 file changed

+0
-12
lines changed

README.md

Lines changed: 0 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -174,15 +174,3 @@ like in the example. In development you can use the latest version:
174174
https://github.com/fuzzitdev/fuzzit/releases/latest/download/fuzzit_${OS}_${ARCH}.
175175
Valid values for `${OS}` are: `Linux`, `Darwin`, `Windows`.
176176
Valid values for `${ARCH}` are: `x86_64` and `i386`.
177-
178-
The steps are:
179-
* Authenticate with the API key (you should keep this secret) from the fuzzit settings dashboard.
180-
* Upload the fuzzer via `create job` command and create the fuzzing job. In This example we use two type of jobs:
181-
* A fuzzing job which is run on every push to master, that continues the previous job with the new release.
182-
This means the current corpus is kept and the fuzzer will try to find new paths in the newly added code.
183-
* In a Pull-Request the fuzzer will run a quick regression test running the fuzzer through all the generated corpuses
184-
and crashes to see if the Pull-Request doesnt introduce old or new crashes. This will be alred via the configured
185-
channel in the dashboard.
186-
* The name of the target is not a secret.
187-
188-
Each target has its own corpus and crashes.

0 commit comments

Comments
 (0)