Babysitter Fuzzing Operations Skill
Comprehensive fuzzing operations with AFL++, libFuzzer, and OSS-Fuzz integration
install
source · Clone the upstream repo
git clone https://github.com/a5c-ai/babysitter
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/a5c-ai/babysitter "$T" && mkdir -p ~/.claude/skills && cp -r "$T/library/specializations/security-research/skills/fuzzing-ops" ~/.claude/skills/a5c-ai-babysitter-fuzzing-operations-skill && rm -rf "$T"
manifest:
library/specializations/security-research/skills/fuzzing-ops/SKILL.mdsource content
Fuzzing Operations Skill
Overview
This skill provides comprehensive fuzzing capabilities for automated vulnerability discovery using industry-standard fuzzing frameworks.
Capabilities
- Configure and launch AFL++ campaigns
- Build instrumented binaries with coverage
- Create and manage seed corpora
- Triage and deduplicate crash files
- Run afl-tmin and afl-cmin for minimization
- Monitor fuzzing progress and coverage
- Generate crash reproduction scripts
- Support libFuzzer and honggfuzz
Target Processes
- fuzzing-campaign.js
- security-tool-development.js
- vulnerability-research-workflow.js
Dependencies
- AFL++ (afl-fuzz, afl-gcc, afl-clang-fast)
- LLVM (for instrumentation)
- Sanitizers (ASAN, MSAN, UBSAN)
- libFuzzer (LLVM)
- honggfuzz (optional)
- Python for crash analysis scripts
Usage Context
This skill is essential for:
- Automated vulnerability discovery
- Coverage-guided fuzzing campaigns
- Crash triage and root cause analysis
- Harness development for fuzzing
- Integration with CI/CD security testing
Integration Notes
- Supports parallel fuzzing across multiple cores
- Can integrate with corpus management systems
- Generates reproducible crash test cases
- Supports various target types (binaries, libraries, protocols)
- Coverage reports in lcov/html format