Skip to content

Glossary

Security Terminology
Defined

Precise definitions for the offensive security terms used across FuzzForge, from fuzzing fundamentals to AI-orchestrated attack concepts.

A

Attack Surface
The total set of entry points through which an attacker could try to enter or extract data from a system. This includes APIs, user inputs, network interfaces, file parsers, and third-party dependencies. Reducing the attack surface and testing all entry points is a core principle of offensive security.

Related: Vulnerability, Fuzzing, Penetration Testing

B

Buffer Overflow
A memory safety vulnerability that occurs when a program writes more data to a memory buffer than it can hold, overwriting adjacent memory. Buffer overflows can be exploited to corrupt data, crash programs, or execute arbitrary code (RCE). They are a primary target of fuzzing tools.

Related: RCE, Memory Safety, Fuzzing

C

Continuous Offensive SecurityCOS
The practice of automatically validating the real exploitability of vulnerabilities in a codebase on every code change, using AI-orchestrated attack agents and sandboxed execution. Unlike periodic penetration testing, it provides ongoing, evidence-based proof of what can actually be exploited in production.

Related: Fuzzing, Exploit, Penetration Testing

Coverage-Guided Fuzzing
A fuzzing technique where the fuzzer uses code coverage feedback (typically via instrumentation) to generate inputs that exercise new code paths. This drastically improves the efficiency of fuzzing compared to purely random input generation.

Related: Fuzzing, Instrumentation

CVECVE
Common Vulnerabilities and Exposures. A public list of known cybersecurity vulnerabilities, each assigned a unique identifier (e.g. CVE-2025-12345). CVEs allow organizations to track, prioritize, and remediate known security issues in software they use.

Related: Vulnerability, Exploit, CVSS

D

DASTDAST
Dynamic Application Security Testing. A method of testing a running application by sending inputs and observing its behavior to find vulnerabilities. Unlike SAST, DAST does not require access to source code and can find runtime-specific issues, but has limited code coverage.

Related: SAST, Fuzzing, Penetration Testing

E

Exploit
A piece of code, technique, or sequence of commands that takes advantage of a vulnerability to cause unintended behavior in a system: gaining unauthorized access, executing arbitrary code, or crashing an application. An exploit proves that a vulnerability is practically exploitable.

Related: CVE, Vulnerability, Proof of Concept

F

FuzzingFUZZ
An automated software testing technique that feeds invalid, unexpected, or random data (fuzz) as input to a program in order to find crashes, memory leaks, and security vulnerabilities. Coverage-guided fuzzing tracks which code paths are executed to maximize code coverage and bug discovery.

Related: Coverage-Guided Fuzzing, AFL, LibFuzzer

False Positive
In security testing, a false positive is an alert or finding that incorrectly identifies a non-vulnerable behavior as a security issue. High false positive rates (common in SAST tools) waste engineering time and cause alert fatigue. FuzzForge eliminates false positives by only reporting confirmed, exploitable vulnerabilities.

Related: SAST, Vulnerability, Proof of Concept

K

Knowledge Graph
In FuzzForge, the Knowledge Graph is a structured, machine-readable representation of a codebase that captures functions, call graphs, data flows, entry points, and dependencies. It allows AI agents to navigate and reason about large codebases efficiently, reducing token consumption and enabling precise vulnerability targeting.

Related: AI Agents, Attack Surface, Continuous Offensive Security

P

Penetration TestingPENTEST
A simulated cyberattack performed by authorized security professionals to evaluate the security of a system. Penetration tests are typically point-in-time assessments conducted periodically (e.g., annually). Continuous Offensive Security extends this by automating attack simulation on every code change.

Related: Continuous Offensive Security, Exploit, Attack Surface

Proof of ConceptPoC
A working demonstration that a vulnerability is genuinely exploitable under real conditions. A PoC exploit proves that a security finding is not theoretical; it shows exactly how an attacker would exploit it. FuzzForge generates PoC artifacts for every confirmed finding.

Related: Exploit, CVE, Vulnerability

R

RCERCE
Remote Code Execution. A class of critical vulnerability that allows an attacker to run arbitrary code on a target system from a remote location, without physical access. RCE vulnerabilities are among the most severe in cybersecurity, often leading to complete system compromise.

Related: Exploit, Buffer Overflow, Deserialization

S

SASTSAST
Static Application Security Testing. A method of analyzing source code, bytecode, or binary code for security vulnerabilities without executing the program. SAST tools scan code at rest and can be integrated into CI/CD pipelines, but typically generate a high rate of false positives.

Related: DAST, Vulnerability, False Positive

Sandbox
An isolated execution environment that restricts what a program can do, limiting file system access, network access, and system calls. In FuzzForge, all security modules run inside a hermetic Kubernetes sandbox with no outbound network access, ensuring target code cannot exfiltrate data or affect external systems.

Related: Isolation, Kubernetes, Continuous Offensive Security

V

Vulnerability
A weakness or flaw in software, hardware, or configuration that can be exploited by an attacker to compromise the security of a system. Vulnerabilities range from memory corruption bugs (buffer overflows, use-after-free) to logic errors, misconfiguration, and cryptographic weaknesses.

Related: CVE, Exploit, Attack Surface

Ready to put these into practice?

FuzzForge automates offensive security testing (fuzzing, injection, RCE validation) on every commit.