Files
fuzzforge_ai/docs/index.md
tduhamel42 37c15af130 docs: Remove obsolete Docker registry configuration
Updated documentation to reflect v0.7.0 Temporal architecture which uses MinIO for storage instead of a Docker registry.

Major changes:
- getting-started.md: Added mandatory volumes/env/.env setup, removed registry config section, updated service list
- docker-setup.md: Complete rewrite focusing on system requirements and worker profiles instead of registry
- index.md: Replaced registry warning with environment file requirement
- troubleshooting.md: Removed all registry troubleshooting, added environment configuration issues
2025-10-17 10:28:17 +02:00

5.5 KiB

FuzzForge Documentation

Welcome to FuzzForge, a comprehensive security analysis platform built on Temporal that automates security testing workflows. FuzzForge provides production-ready workflows that run static analysis, secret detection, infrastructure scanning, penetration testing, and custom fuzzing campaigns with Docker-based isolation and SARIF-compliant reporting.

🚀 Quick Navigation

📚 Tutorials - Learn by doing

Perfect for newcomers who want to learn FuzzForge step by step.

🛠️ How-To Guides - Problem-focused solutions

Step-by-step guides for specific tasks and common problems.

💡 Concepts - Understanding-oriented

Background information and conceptual explanations.

📖 Reference - Information-oriented

Technical reference materials and specifications.

Workflows

APIs and Interfaces

Additional Resources


🎯 FuzzForge at a Glance

6 Production Workflows:

  • Static Analysis (Semgrep, Bandit, CodeQL)
  • Secret Detection (TruffleHog, Gitleaks, detect-secrets)
  • Infrastructure Scan (Checkov, Hadolint, Kubesec)
  • Penetration Testing (Nuclei, Nmap, SQLMap, Nikto)
  • Language Fuzzing (AFL++, libFuzzer, Cargo Fuzz)
  • Security Assessment (Comprehensive multi-tool analysis)

Multiple Interfaces:

  • 💻 CLI: fuzzforge runs submit static_analysis_scan /path/to/code
  • 🐍 Python SDK: Programmatic workflow integration
  • 🌐 REST API: HTTP-based workflow management
  • 🤖 MCP: AI assistant integration (Claude, ChatGPT)

Key Features:

  • Container-based workflow execution with Docker isolation
  • SARIF-compliant security results format
  • Real-time workflow monitoring and progress tracking
  • Persistent result storage with shared volumes
  • Custom Docker image building for specialized tools

🚨 Important Setup Requirement

Environment Configuration Required

Before starting FuzzForge, you must create the environment configuration file:

cp volumes/env/.env.example volumes/env/.env

Docker Compose will fail without this file. You can leave it with default values if you're only using basic workflows (no AI features).

See Getting Started Guide for detailed setup instructions.


📋 Documentation Framework

This documentation follows the Diátaxis framework:

  • Tutorials: Learning-oriented, hands-on lessons
  • How-to guides: Problem-oriented, step-by-step instructions
  • Concepts: Understanding-oriented, theoretical knowledge
  • Reference: Information-oriented, technical specifications

New to FuzzForge? Start with the Getting Started Tutorial

Need help? Check the FAQ or Troubleshooting Guide

Want to contribute? See the Contributing Guide