Files
fuzzforge_ai/docs/index.md
tduhamel42 40d48a8045 feat: Complete Temporal migration cleanup and fixes
- Remove obsolete docker_logs.py module and container diagnostics from SDK
- Fix security_assessment workflow metadata (vertical: rust -> python)
- Remove all Prefect references from documentation
- Add SDK exception handling test suite
- Clean up old test artifacts
2025-10-14 15:02:52 +02:00

5.4 KiB

FuzzForge Documentation

Welcome to FuzzForge, a comprehensive security analysis platform built on Temporal that automates security testing workflows. FuzzForge provides production-ready workflows that run static analysis, secret detection, infrastructure scanning, penetration testing, and custom fuzzing campaigns with Docker-based isolation and SARIF-compliant reporting.

🚀 Quick Navigation

📚 Tutorials - Learn by doing

Perfect for newcomers who want to learn FuzzForge step by step.

🛠️ How-To Guides - Problem-focused solutions

Step-by-step guides for specific tasks and common problems.

💡 Concepts - Understanding-oriented

Background information and conceptual explanations.

📖 Reference - Information-oriented

Technical reference materials and specifications.

Workflows

APIs and Interfaces

Additional Resources


🎯 FuzzForge at a Glance

6 Production Workflows:

  • Static Analysis (Semgrep, Bandit, CodeQL)
  • Secret Detection (TruffleHog, Gitleaks, detect-secrets)
  • Infrastructure Scan (Checkov, Hadolint, Kubesec)
  • Penetration Testing (Nuclei, Nmap, SQLMap, Nikto)
  • Language Fuzzing (AFL++, libFuzzer, Cargo Fuzz)
  • Security Assessment (Comprehensive multi-tool analysis)

Multiple Interfaces:

  • 💻 CLI: fuzzforge runs submit static_analysis_scan /path/to/code
  • 🐍 Python SDK: Programmatic workflow integration
  • 🌐 REST API: HTTP-based workflow management
  • 🤖 MCP: AI assistant integration (Claude, ChatGPT)

Key Features:

  • Container-based workflow execution with Docker isolation
  • SARIF-compliant security results format
  • Real-time workflow monitoring and progress tracking
  • Persistent result storage with shared volumes
  • Custom Docker image building for specialized tools

🚨 Important Setup Requirement

Docker Insecure Registry Configuration Required

FuzzForge uses a local Docker registry for workflow images. You must configure Docker to allow insecure registries:

{
  "insecure-registries": ["localhost:5001"]
}

See Docker Setup Guide for detailed configuration instructions.


📋 Documentation Framework

This documentation follows the Diátaxis framework:

  • Tutorials: Learning-oriented, hands-on lessons
  • How-to guides: Problem-oriented, step-by-step instructions
  • Concepts: Understanding-oriented, theoretical knowledge
  • Reference: Information-oriented, technical specifications

New to FuzzForge? Start with the Getting Started Tutorial

Need help? Check the FAQ or Troubleshooting Guide

Want to contribute? See the Contributing Guide