]> git.ipfire.org Git - thirdparty/systemd.git/blobdiff - HACKING
po: update Italian translation
[thirdparty/systemd.git] / HACKING
diff --git a/HACKING b/HACKING
index 551216bb45b681fa9f5ba6a28dece616ab36e3bb..e9a159ba9f9033bdbd0afc1a5f0047e637286bd1 100644 (file)
--- a/HACKING
+++ b/HACKING
@@ -95,14 +95,16 @@ scripts/oss-fuzz.sh.
 
 The fuzzers can be built locally if you have libFuzzer installed by running
 scripts/oss-fuzz.sh. You should also confirm that the fuzzer runs in the
-OSS-Fuzz environment by checking out the OSS-Fuzz repo, modifying the git clone
-in projects/systemd/Dockerfile to point at your code (for example, a fork on
-GitHub) and then running these commands:
+OSS-Fuzz environment by checking out the OSS-Fuzz repo, and then running
+commands like this:
 
         python infra/helper.py build_image systemd
-        python infra/helper.py build_fuzzers --sanitizer memory systemd
+        python infra/helper.py build_fuzzers --sanitizer memory systemd ../systemd
         python infra/helper.py run_fuzzer systemd fuzz-foo
 
+If you find a bug that impacts the security of systemd, please follow the
+guidance in .github/CONTRIBUTING.md on how to report a security vulnerability.
+
 For more details on building fuzzers and integrating with OSS-Fuzz, visit:
 
         https://github.com/google/oss-fuzz/blob/master/docs/new_project_guide.md