How AI-Automated Fuzzing Uncovered a Vulnerability in wolfSSL
Despite wolfSSL’s rigorous software testing practices, in October 2024, Code Intelligence—an application security vendor—discovered a potentially exploitable defect in wolfSSL. Remarkably, the potential vulnerability was found without human intervention. The only manual step was executing a single command to trigger autonomous fuzz testing.
Watch the video for a live demo of AI-automated fuzzing.
In this video, you’ll:
✅ Discover how wolfSSL tests its code to ensure quality and security.
✅ Learn how AI-automated fuzz testing works and how it autonomously found the vulnerability.
✅ Watch a live demo of AI-automated fuzz testing on wolfSSL’s libraries.
Book a tailored demo: https://www.code-intelligence.com/book-a-demo
Download the free guide 'Fuzz Testing Solution Comparison': https://www.code-intelligence.com/guide-fuzz-testing-solutions-comparison
Time stamps
00:00 wolfSSL Intro
00:52 Testing at wolfSSL: An Overview
05:36 How do we test?
08:45 Making sure you know what you're testing
10:05 A case study
12:41 Code Intelligence Intro
12:58 Automatic fuzzing of wolfSSL
14:04 Fuzzing started as a black-box method
14:56 Whitebox fuzzing
16:50 Motivation to automate fuzz testing
19:35 Fuzzability of wolfSSL
21:15 Live Demo
42:22 Fast-forward after 3 hours
43:50 Next steps
44:33 Q&A