We are beyond excited to share some fantastic news with our community: Jazzer is now fully open source again under the Apache 2.0 license! 🎉
Reflecting on the Journey
A year ago, we made the difficult decision to temporarily stop maintaining Jazzer as open-source. However, throughout the past year, the passion and feedback from our incredible community inspired us to revisit this decision. We heard from many of you who shared your use cases, ideas, and support offerings to help maintain Jazzer as open-source. This overwhelming response encouraged us to find a path forward that balances our business goals and our commitment to the open-source community.
Back to Apache 2.0
Thanks to the collective effort of our team and the community, Jazzer is now open source once again under Apache 2.0. We’re thrilled to be able to contribute these powerful fuzz testing tools for Java and other JVM languages back to the community and support innovation in software security testing.
What’s Next?
We’re committed to making Jazzer more effective and user-friendly for developers. With this release, we’ve added two major features to enhance fuzz testing workflows:
- Improved Mutator Framework: Jazzer now supports mutators for Plain Old Java Objects (POJOs). This reduces the need for repetitive boilerplate when interacting with the fuzz data provider, resulting in better performance and improved code coverage. It’s a more direct and efficient way to fuzz interfaces operating with complex data structures.
- Improved jUnit Integration: We’ve enhanced support for jUnit, allowing you to integrate fuzz tests seamlessly into your existing testing workflows. This makes it easier to use fuzzing alongside your unit tests, view results and coverage information, and debug issues directly from any IDE supporting jUnit.
These updates aim to make fuzz testing more natural and efficient for developers working with Java applications.
A Big Thank You!
This wouldn’t have been possible without the incredible support from our users, contributors, and partners. We've decided to make this change based on your input and feedback. We're excited to move forward together.
Also, a special shout-out to the Google Open Source Security Team / OSS-Fuzz team. In our collaboration, we uncovered over 500 critical security issues in 150 OSS libraries, including over 50 CVEs, in the past two years.
Join Us
- Have questions or want to contribute? Reach out at info@code-intelligence.com.
- Get started with Jazzer on GitHub!
“Let’s continue to make fuzz testing smarter, faster, and more secure—together. 🚀
Stay tuned for more updates and thank you for being part of this journey! ❤️”
—The Code Intelligence Team