ossfuzz

skills-sh:trailofbits_skills__ossfuzz

View source
A
100/100

First Seen

Feb 18, 2026

Last Scanned

Feb 20, 2026

Findings

6

Score

100/100

LOW 6

Findings (6)

LOW
Runtime URL controlling behavior
L79

Detects URLs fetched at runtime that control or influence agent behavior without pinning

Read [this case study](https:// + setting
FIX

Avoid loading configuration or behavior-controlling content from runtime URLs. Bundle required configurations locally or pin remote config to versioned, integrity-verified endpoints.

FP?

Likely FP if the URL in the match is a documentation link or example URL (e.g., example.com) rather than an actual runtime-fetched configuration endpoint.

LOW
Mutable GitHub raw content reference
L79

Detects references to raw.githubusercontent.com on mutable branches like main/master

github.com/ossf/fuzz-introspector/blob/main/doc/CaseStudies.md)
FIX

Replace GitHub raw.githubusercontent.com references with pinned commit SHAs instead of branch names (e.g., /commit-sha/file instead of /main/file). Branch references are mutable.

FP?

Likely FP if the raw GitHub URL points to a versioned release tag in a well-known repository, though even tags are technically mutable.

LOW
Docker pull and run untrusted image
L153

Detects pulling and running Docker images from external registries

docker run --rm --privileged --shm-size=2g --platform linux/a
FIX

Pin Docker images to a specific digest (e.g., image@sha256:abc...) instead of using mutable tags like :latest. Use trusted base images from verified publishers.

FP?

Likely FP if the Docker command pulls a well-known official image (e.g., docker pull python:3.11) in setup documentation.

LOW
Shell script file execution
L201

Detects execution of shell script files via bash/sh command or direct invocation

./autogen.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Mutable GitHub raw content reference
L223

Detects references to raw.githubusercontent.com on mutable branches like main/master

github.com/google/oss-fuzz/blob/master/infra/base-images/base-image/Dockerfile)**
FIX

Replace GitHub raw.githubusercontent.com references with pinned commit SHAs instead of branch names (e.g., /commit-sha/file instead of /main/file). Branch references are mutable.

FP?

Likely FP if the raw GitHub URL points to a versioned release tag in a well-known repository, though even tags are technically mutable.

LOW
Mutable GitHub raw content reference
L421

Detects references to raw.githubusercontent.com on mutable branches like main/master

github.com/ossf/fuzz-introspector/blob/main/doc/CaseStudies.md)**
FIX

Replace GitHub raw.githubusercontent.com references with pinned commit SHAs instead of branch names (e.g., /commit-sha/file instead of /main/file). Branch references are mutable.

FP?

Likely FP if the raw GitHub URL points to a versioned release tag in a well-known repository, though even tags are technically mutable.