{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":63809205,"defaultBranch":"master","name":"oss-fuzz","ownerLogin":"google","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2016-07-20T19:39:50.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/1342004?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1717693722.0","currentOid":""},"activityList":{"items":[{"before":"9249f93bd2f75e7cdaa57ba3321d6285e31487bf","after":"e43cf762fb3437e6aae1ab4cf9297c304daa26d0","ref":"refs/heads/master","pushedAt":"2024-06-07T19:45:22.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"jonathanmetzman","name":null,"path":"/jonathanmetzman","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31354670?s=80&v=4"},"commit":{"message":"Initial Project Skeleton pikepdf (#12035)\n\npikepdf is a Python library allowing creation, manipulation and repair\r\nof PDFs. It provides a Pythonic wrapper around the C++ PDF content\r\ntransformation library, QPDF. It is used by over 3800 repositories and\r\n90 packages. Most notably, OCRmyPDF (12,400+ stars) uses pikepdf to\r\ngraft OCR text layers onto existing PDFs, to examine the contents of\r\ninput PDFs, and to optimize PDFs. Additionally, PDFArranger (3000+\r\nstars) depends on pikepdf and is a Python application that provides a\r\ngraphical user interface to rotate, crop and rearrange PDFs. It is\r\nimportant that fuzzing be integrarted into pikepdf as the domino effect\r\nof a high or critical vulnerability in pikepdf would cause numerous\r\nother open source software products to be vulnerable as well.\r\n\r\nApproval from the upstream maintainer can be found here:\r\nhttps://github.com/pikepdf/pikepdf/issues/587","shortMessageHtmlLink":"Initial Project Skeleton pikepdf (#12035)"}},{"before":"a7c524dca08b3d21ef060e42443362019415d5cc","after":"9249f93bd2f75e7cdaa57ba3321d6285e31487bf","ref":"refs/heads/master","pushedAt":"2024-06-07T19:44:39.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"jonathanmetzman","name":null,"path":"/jonathanmetzman","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31354670?s=80&v=4"},"commit":{"message":"[wamr] update the working directory (#12039)\n\nfix issue 69490\r\n\r\nSigned-off-by: liang.he@intel.com ","shortMessageHtmlLink":"[wamr] update the working directory (#12039)"}},{"before":"ec400c9bcb629c189d1ddd67ca1ed93bbaa6d27f","after":"a7c524dca08b3d21ef060e42443362019415d5cc","ref":"refs/heads/master","pushedAt":"2024-06-07T19:44:29.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"jonathanmetzman","name":null,"path":"/jonathanmetzman","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31354670?s=80&v=4"},"commit":{"message":"Fix doc timeouts and ooms and allow these options in GH Action (#12003)\n\n#11723","shortMessageHtmlLink":"Fix doc timeouts and ooms and allow these options in GH Action (#12003)"}},{"before":"85c18b6dab6af1dfd9e90bf34fa040b8355e3adf","after":"ec400c9bcb629c189d1ddd67ca1ed93bbaa6d27f","ref":"refs/heads/master","pushedAt":"2024-06-07T11:12:54.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"DavidKorczynski","name":null,"path":"/DavidKorczynski","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/657617?s=80&v=4"},"commit":{"message":"pacemaker: fix broken build (#12037)\n\nI am getting errors when building Pacemaker locally. This should fix it.\r\n\r\nSigned-off-by: Adam Korczynski ","shortMessageHtmlLink":"pacemaker: fix broken build (#12037)"}},{"before":"ba4e91c86f082d1afa431d18b5d30c90cbd04d31","after":null,"ref":"refs/heads/fix-pacemaker-5","pushedAt":"2024-06-06T17:56:09.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"AdamKorcz","name":null,"path":"/AdamKorcz","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/44787359?s=80&v=4"}},{"before":"fa8e451d07b369dc430cc261196d09f1a261be86","after":"85c18b6dab6af1dfd9e90bf34fa040b8355e3adf","ref":"refs/heads/master","pushedAt":"2024-06-06T17:56:09.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"AdamKorcz","name":null,"path":"/AdamKorcz","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/44787359?s=80&v=4"},"commit":{"message":"pacemaker: fix build (#12033)\n\nSigned-off-by: David Korczynski ","shortMessageHtmlLink":"pacemaker: fix build (#12033)"}},{"before":null,"after":"ba4e91c86f082d1afa431d18b5d30c90cbd04d31","ref":"refs/heads/fix-pacemaker-5","pushedAt":"2024-06-06T17:08:42.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"DavidKorczynski","name":null,"path":"/DavidKorczynski","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/657617?s=80&v=4"},"commit":{"message":"pacemaker: fix build\n\nSigned-off-by: David Korczynski ","shortMessageHtmlLink":"pacemaker: fix build"}},{"before":"f31d0a5d5d316419d90d1f0e3a22fef77482f59d","after":"fa8e451d07b369dc430cc261196d09f1a261be86","ref":"refs/heads/master","pushedAt":"2024-06-05T19:31:29.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"jonathanmetzman","name":null,"path":"/jonathanmetzman","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31354670?s=80&v=4"},"commit":{"message":"[libcups] Init integration (#12021)\n\nThe OpenPrinting Team is integrating C-based projects into the OSS-Fuzz\r\nFramework. The maintaining fuzz harnesses locate in OpenPrinting project\r\n[fuzzing](https://github.com/OpenPrinting/fuzzing).\r\n\r\nThis PR contains the initial integration config for OpenPrinting project\r\nlibcups.\r\n\r\nCC: @tillkamppeter @iosifache\r\n\r\n---------\r\n\r\nSigned-off-by: TTFISH ","shortMessageHtmlLink":"[libcups] Init integration (#12021)"}},{"before":"0406dd5676262d69cf534a10191b5af8ece60b1c","after":"f31d0a5d5d316419d90d1f0e3a22fef77482f59d","ref":"refs/heads/master","pushedAt":"2024-06-05T17:52:47.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"jonathanmetzman","name":null,"path":"/jonathanmetzman","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31354670?s=80&v=4"},"commit":{"message":"Add ms-tpm-20-ref, the Microsoft TPM2 reference implementation (#12030)\n\nSigned-off-by: Tamas K Lengyel \r\n\r\n---------\r\n\r\nSigned-off-by: Tamas K Lengyel ","shortMessageHtmlLink":"Add ms-tpm-20-ref, the Microsoft TPM2 reference implementation (#12030)"}},{"before":"fac55feb21bb7fada110efe31980f88bf6537c9b","after":"0406dd5676262d69cf534a10191b5af8ece60b1c","ref":"refs/heads/master","pushedAt":"2024-06-05T10:47:19.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"DavidKorczynski","name":null,"path":"/DavidKorczynski","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/657617?s=80&v=4"},"commit":{"message":"[infra] Fix jacoco_report_converter.py (#12026)\n\nThere are 2 bugs in the jacoco_report_converter.py in which the src_file\r\nand src_path are redefined and overwritten in the loop. These bugs cause\r\nboth of them to empty after the first iteration. This makes the\r\nresulting JSON report summary only contain the first filename to\r\nprocess. This has been mentioned in #11966.\r\nThis PR proposes a fix by changing the name of the needed variables.\r\nAlso, this PR adds in a filter to exclude fuzzer classes in the coverage\r\ninformation as they are not part of the projects. The updated script\r\nwill include the coverage information for each class that existed in the\r\nproject source directory (`/out/src`) in the summary tag of the\r\nresulting summary.json report.\r\n\r\nSigned-off-by: Arthur Chan ","shortMessageHtmlLink":"[infra] Fix jacoco_report_converter.py (#12026)"}},{"before":"932892bf9320e3bc794f8bc19f20a4f80ace788f","after":"fac55feb21bb7fada110efe31980f88bf6537c9b","ref":"refs/heads/master","pushedAt":"2024-06-04T19:25:33.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"jonathanmetzman","name":null,"path":"/jonathanmetzman","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31354670?s=80&v=4"},"commit":{"message":"[wamr] init build.sh and Dockerfile (#11987)\n\nSigned-off-by: lum1n0us ","shortMessageHtmlLink":"[wamr] init build.sh and Dockerfile (#11987)"}},{"before":"61fe71f5c05dec2a14a98b83e10c3182442d8f5b","after":"932892bf9320e3bc794f8bc19f20a4f80ace788f","ref":"refs/heads/master","pushedAt":"2024-06-04T19:24:59.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"jonathanmetzman","name":null,"path":"/jonathanmetzman","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31354670?s=80&v=4"},"commit":{"message":"[wamr] enable both asan and ubsan (#11989)\n\nSigned-off-by: liang.he@intel.com ","shortMessageHtmlLink":"[wamr] enable both asan and ubsan (#11989)"}},{"before":"4eff3ad85243e8387c05da4eae4684e6d7544e22","after":null,"ref":"refs/heads/dependabot/pip/infra/build/functions/pip-470bac6f44","pushedAt":"2024-06-04T19:22:05.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"}},{"before":"4bffaf8f3ab755f9479a67f5fd0085532e509621","after":"61fe71f5c05dec2a14a98b83e10c3182442d8f5b","ref":"refs/heads/master","pushedAt":"2024-06-04T19:21:29.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"jonathanmetzman","name":null,"path":"/jonathanmetzman","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31354670?s=80&v=4"},"commit":{"message":"mdbook-i18n-helpers: Initial integration (#11997)\n\n[mdbook-i18n-helpers](https://github.com/google/mdbook-i18n-helpers/) is\r\na plugin for [mdbook](https://rust-lang.github.io/mdBook/) which enables\r\nlocalization support.\r\nAccording to [crates](https://crates.io/crates/mdbook-i18n-helpers), it\r\nwas downloaded ~100k times.\r\n\r\nThe project already defines [several fuzzers within its\r\nrepo](https://github.com/google/mdbook-i18n-helpers/tree/main/fuzz).\r\n\r\nI am one of the maintainers of the project. The main maintainer\r\n@mgeisler approves of this request as can be seen from\r\nhttps://github.com/google/mdbook-i18n-helpers/issues/83.","shortMessageHtmlLink":"mdbook-i18n-helpers: Initial integration (#11997)"}},{"before":"bf60a0acd335ec208f6de9ea5274438b305e9d56","after":"23acb7d9adb7f6b9f81923d9b9776c9a85d31413","ref":"refs/heads/deploy-blog","pushedAt":"2024-06-04T19:20:07.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jonathanmetzman","name":null,"path":"/jonathanmetzman","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31354670?s=80&v=4"},"commit":{"message":"Update deploy.sh","shortMessageHtmlLink":"Update deploy.sh"}},{"before":"44abec5d38363614708ec5ee7fddaf48dbd257c2","after":"4bffaf8f3ab755f9479a67f5fd0085532e509621","ref":"refs/heads/master","pushedAt":"2024-06-04T19:18:48.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"jonathanmetzman","name":null,"path":"/jonathanmetzman","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31354670?s=80&v=4"},"commit":{"message":"infra/presubmit: Use apt-get update before installing (#12008)\n\nOtherwise, this may lead to issues such as\r\nhttps://github.com/google/oss-fuzz/pull/11943#issue-2290477404\r\n\r\nAlso, fix the broken `.zip` test.\r\n\r\n---------\r\n\r\nCo-authored-by: MarcoFalke <6399679+MarcoFalke@users.noreply.github.com>\r\nCo-authored-by: jonathanmetzman <31354670+jonathanmetzman@users.noreply.github.com>","shortMessageHtmlLink":"infra/presubmit: Use apt-get update before installing (#12008)"}},{"before":"1515519a665756d8a50a6c46abac8b431e5462ef","after":"44abec5d38363614708ec5ee7fddaf48dbd257c2","ref":"refs/heads/master","pushedAt":"2024-06-04T19:15:00.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"jonathanmetzman","name":null,"path":"/jonathanmetzman","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31354670?s=80&v=4"},"commit":{"message":"First crack at oss-fuzz rigging for fontations (#12011)\n\nTake a first swing at rigging a\r\nhttps://github.com/googlefonts/fontations fuzzer. Setup based on\r\nhttps://google.github.io/oss-fuzz/getting-started/new-project-guide/rust-lang/.\r\nI have never rigged a Rust fuzzer before, advice most appreciated.\r\n\r\nTo increase our odds try to provide a decent corpus of test fonts.\r\n\r\nFor context Google Fonts and Chrome are collaborating to migrate some\r\ntext rendering paths in Chrome to use [skrifa](https://docs.rs/skrifa/)\r\ninstead of FreeType. As with woff2, we view fuzzing prior to shipping as\r\nmandatory. EDIT: one more ref,\r\nhttps://chromestatus.com/feature/5717358869217280.\r\n\r\nStep toward https://github.com/googlefonts/fontations/issues/420.\r\n\r\nThe fuzzer is added to fontations in\r\nhttps://github.com/googlefonts/fontations/pull/917. Best not to merge\r\nthis until that goes in. EDIT: now merged. Minimal function, will extend\r\nuse cases tested over time.","shortMessageHtmlLink":"First crack at oss-fuzz rigging for fontations (#12011)"}},{"before":"b7839236da08e06718b9beffdb19429e3c66fcf5","after":null,"ref":"refs/heads/DavidKorczynski-patch-9","pushedAt":"2024-06-04T10:10:37.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"DavidKorczynski","name":null,"path":"/DavidKorczynski","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/657617?s=80&v=4"}},{"before":"074fb6fdabcc59d0c2c2ab5984a1bd31a14b811c","after":"1515519a665756d8a50a6c46abac8b431e5462ef","ref":"refs/heads/master","pushedAt":"2024-06-04T10:10:36.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"DavidKorczynski","name":null,"path":"/DavidKorczynski","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/657617?s=80&v=4"},"commit":{"message":"infra: bump introspector (#12024)\n\nPrimary update here is improvements in the way we store data, which\r\nimproves the performance of the webapp","shortMessageHtmlLink":"infra: bump introspector (#12024)"}},{"before":"7e48621e80ca569b667c47146cb6332e83b07cb4","after":"074fb6fdabcc59d0c2c2ab5984a1bd31a14b811c","ref":"refs/heads/master","pushedAt":"2024-06-04T10:01:47.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"DavidKorczynski","name":null,"path":"/DavidKorczynski","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/657617?s=80&v=4"},"commit":{"message":"Make Seth the primary cpython3 oss-fuzz contact. (#12025)\n\n@sethmlarson - Seth is the security developer in residence for CPython\r\nat the PSF. He makes sense as the primary contact.\r\n\r\nStop using my former employers account as my oss-fuzz address given that\r\nthey kicked our team out for being too valuable.","shortMessageHtmlLink":"Make Seth the primary cpython3 oss-fuzz contact. (#12025)"}},{"before":"98024e835998b30e488b8ea8e3969ff7bfe155ad","after":"381dbf756032cb72b91c60c8fa6d0b7087da34dd","ref":"refs/heads/jcc2.0","pushedAt":"2024-06-04T03:52:18.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"DonggeLiu","name":"Dongge Liu","path":"/DonggeLiu","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/20501961?s=80&v=4"},"commit":{"message":"minimize changes","shortMessageHtmlLink":"minimize changes"}},{"before":"83f519c45e34d3aaabc1cb6f44f621d644209504","after":"7e48621e80ca569b667c47146cb6332e83b07cb4","ref":"refs/heads/master","pushedAt":"2024-06-04T03:38:56.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"DonggeLiu","name":"Dongge Liu","path":"/DonggeLiu","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/20501961?s=80&v=4"},"commit":{"message":"[krb5] update repo and maintainer email (#11984)\n\nMy base PR has been merged in krb5:\r\nhttps://github.com/krb5/krb5/pull/1346. Can you merge this?\r\n\r\nSigned-off-by: Arjun ","shortMessageHtmlLink":"[krb5] update repo and maintainer email (#11984)"}},{"before":"a0fd8dcbd5357260555ff936362980efa6ef9a63","after":"83f519c45e34d3aaabc1cb6f44f621d644209504","ref":"refs/heads/master","pushedAt":"2024-06-03T21:48:48.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"jonathanmetzman","name":null,"path":"/jonathanmetzman","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/31354670?s=80&v=4"},"commit":{"message":"librsvg: initial fuzz_target integration (#11929)\n\nCC: @federicomenaquintero","shortMessageHtmlLink":"librsvg: initial fuzz_target integration (#11929)"}},{"before":null,"after":"b7839236da08e06718b9beffdb19429e3c66fcf5","ref":"refs/heads/DavidKorczynski-patch-9","pushedAt":"2024-06-03T20:47:16.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"DavidKorczynski","name":null,"path":"/DavidKorczynski","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/657617?s=80&v=4"},"commit":{"message":"infra: bump introspector\n\nPrimary update here is improvements in the way we store data, which improves the performance of the webapp","shortMessageHtmlLink":"infra: bump introspector"}},{"before":"8f188bd2b7993a12f492228a7fce6ec445799119","after":"a0fd8dcbd5357260555ff936362980efa6ef9a63","ref":"refs/heads/master","pushedAt":"2024-06-03T18:42:03.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"DavidKorczynski","name":null,"path":"/DavidKorczynski","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/657617?s=80&v=4"},"commit":{"message":"bitcoin-core: Disable centipede again to fix build (#12023)\n\nCo-authored-by: MarcoFalke <6399679+MarcoFalke@users.noreply.github.com>","shortMessageHtmlLink":"bitcoin-core: Disable centipede again to fix build (#12023)"}},{"before":"b5510899dcac8b2c3f0da604931455df236be844","after":null,"ref":"refs/heads/pacemaker-fix","pushedAt":"2024-06-03T10:33:54.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"AdamKorcz","name":null,"path":"/AdamKorcz","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/44787359?s=80&v=4"}},{"before":"f9c55ba6ba2a5ed082b022f6e1ce4cf8f982739e","after":"8f188bd2b7993a12f492228a7fce6ec445799119","ref":"refs/heads/master","pushedAt":"2024-06-03T10:33:54.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"AdamKorcz","name":null,"path":"/AdamKorcz","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/44787359?s=80&v=4"},"commit":{"message":"paceaker: fix build (#12022)\n\nSigned-off-by: David Korczynski ","shortMessageHtmlLink":"paceaker: fix build (#12022)"}},{"before":null,"after":"b5510899dcac8b2c3f0da604931455df236be844","ref":"refs/heads/pacemaker-fix","pushedAt":"2024-06-03T10:15:29.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"DavidKorczynski","name":null,"path":"/DavidKorczynski","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/657617?s=80&v=4"},"commit":{"message":"paceaker: fix build\n\nSigned-off-by: David Korczynski ","shortMessageHtmlLink":"paceaker: fix build"}},{"before":"c42faeed182dd2b06916ec72651b4661d15aa6cb","after":"f9c55ba6ba2a5ed082b022f6e1ce4cf8f982739e","ref":"refs/heads/master","pushedAt":"2024-06-01T10:55:19.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"DavidKorczynski","name":null,"path":"/DavidKorczynski","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/657617?s=80&v=4"},"commit":{"message":"mpv: explicitly enable Centipede (#12019)\n\nAccording to the documentation [1] and oss-fuzz source [2] it should be\r\nenabled by default. But in fact it is not enabled by default on the\r\nClusterFuzz [3] and only projects that explicity enable Centipede are\r\nusing\r\nthis engine.\r\n\r\n[1]\r\nhttps://google.github.io/oss-fuzz/getting-started/new-project-guide/#fuzzing_engines\r\n[2]\r\nhttps://github.com/google/oss-fuzz/blob/b07cc908abf97529a95a4dd9b3d152bf4f101e71/infra/build/functions/build_project.py#L47\r\n[3]\r\nhttps://github.com/google/clusterfuzz/blob/22e11083b540518248d512141c45c25c7f560f2e/src/clusterfuzz/_internal/cron/project_setup.py#L204\r\n\r\nSee-Also: https://github.com/google/oss-fuzz/issues/11964","shortMessageHtmlLink":"mpv: explicitly enable Centipede (#12019)"}},{"before":"9cb02d902bdf613a5b081e069ac1f4824e9ccebc","after":"c42faeed182dd2b06916ec72651b4661d15aa6cb","ref":"refs/heads/master","pushedAt":"2024-06-01T10:54:30.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"DavidKorczynski","name":null,"path":"/DavidKorczynski","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/657617?s=80&v=4"},"commit":{"message":"libwebp: use upstream build file. (#12020)","shortMessageHtmlLink":"libwebp: use upstream build file. (#12020)"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEX4x-LgA","startCursor":null,"endCursor":null}},"title":"Activity ยท google/oss-fuzz"}