{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2026:SZI5HFTUUZFFVISOAXCQ7F34WG","short_pith_number":"pith:SZI5HFTU","canonical_record":{"source":{"id":"2605.14431","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2026-05-14T06:21:33Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"9842339855befa574a7ca519d0d9cd5dc42c7b76fed32777468c14ab61665b29","abstract_canon_sha256":"7ed1c52e6482e8afdbfab9f7d48a0e24b73febe9719fcf8404921ec9c0b9c633"},"schema_version":"1.0"},"canonical_sha256":"9651d39674a64a5aa24e05c50f977cb19ec422150c73a78517125f9231d1ca4f","source":{"kind":"arxiv","id":"2605.14431","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.14431","created_at":"2026-05-17T23:39:07Z"},{"alias_kind":"arxiv_version","alias_value":"2605.14431v1","created_at":"2026-05-17T23:39:07Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.14431","created_at":"2026-05-17T23:39:07Z"},{"alias_kind":"pith_short_12","alias_value":"SZI5HFTUUZFF","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_16","alias_value":"SZI5HFTUUZFFVISO","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_8","alias_value":"SZI5HFTU","created_at":"2026-05-18T12:33:37Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2026:SZI5HFTUUZFFVISOAXCQ7F34WG","target":"record","payload":{"canonical_record":{"source":{"id":"2605.14431","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2026-05-14T06:21:33Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"9842339855befa574a7ca519d0d9cd5dc42c7b76fed32777468c14ab61665b29","abstract_canon_sha256":"7ed1c52e6482e8afdbfab9f7d48a0e24b73febe9719fcf8404921ec9c0b9c633"},"schema_version":"1.0"},"canonical_sha256":"9651d39674a64a5aa24e05c50f977cb19ec422150c73a78517125f9231d1ca4f","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:39:07.132717Z","signature_b64":"pJoU2GJYl1grvXoIPJko7Ljh0vF+TJ8cnT5I7mKEa1KPCHxZpbwgykgTQNSInVgSHcTriPMimoimIdkvrtPCBg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"9651d39674a64a5aa24e05c50f977cb19ec422150c73a78517125f9231d1ca4f","last_reissued_at":"2026-05-17T23:39:07.132019Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:39:07.132019Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2605.14431","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:39:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Eha9JJxKp0m727X5g85UTvBQbkcExo6SjskBauTJoOtsIiYMmtvJ5/n1P+D5/BE4CxtaqW4Voarftj6399DBDA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T11:12:00.768143Z"},"content_sha256":"4ab78df4805a0d8c7906bc9cf70f34b689ab570d93a01724919c98749e97cdb1","schema_version":"1.0","event_id":"sha256:4ab78df4805a0d8c7906bc9cf70f34b689ab570d93a01724919c98749e97cdb1"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2026:SZI5HFTUUZFFVISOAXCQ7F34WG","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"FuzzAgent: Multi-Agent System for Evolutionary Library Fuzzing","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"A multi-agent system automates the full library fuzzing lifecycle by evolving harnesses from runtime feedback.","cross_cats":["cs.CR"],"primary_cat":"cs.SE","authors_text":"Fengyi Wu, Hao Chen, Junzhe Yu, Kit Long Hon, Peng Chen, Yunlong Lyu","submitted_at":"2026-05-14T06:21:33Z","abstract_excerpt":"Library fuzzing is essential for hardening the software supply chain, but adopting it at scale remains expensive. Practitioners still spend substantial effort on environment setup, struggle to generate harnesses that respect intricate API constraints, and lack reliable means to tell genuine library bugs from harness-induced crashes. Recent LLM-based systems automate parts of this pipeline, yet they typically operate as one-shot code generators that ignore runtime feedback, which limits both the depth of code they reach and the validity of the bugs they report. We argue that effective library f"},"claims":{"count":4,"items":[{"kind":"strongest_claim","text":"FuzzAgent completes the full fuzzing lifecycle for all 20 libraries without human intervention and reaches 179619 branches, exceeding OSS-Fuzz, PromptFuzz, PromeFuzz, and OSS-Fuzz-Gen by 45.1%, 73.2%, 92.1%, and 191.2%, respectively. FuzzAgent also identifies 102 genuine library bugs, 78 of which have already been acknowledged and fixed by upstream maintainers.","source":"verdict.strongest_claim","status":"machine_extracted","claim_id":"C1","attestation":"unclaimed"},{"kind":"weakest_assumption","text":"That the multi-agent loop can reliably distinguish genuine library bugs from harness-induced crashes and that the runtime feedback signals are sufficient to drive meaningful iterative improvement without human oversight or post-hoc filtering.","source":"verdict.weakest_assumption","status":"machine_extracted","claim_id":"C2","attestation":"unclaimed"},{"kind":"one_line_summary","text":"FuzzAgent deploys specialized agents that collaborate on harness generation, execution, and crash triage to evolve fuzzing campaigns, delivering 45-191% more branch coverage than four baselines on 20 C/C++ libraries and surfacing 102 real bugs.","source":"verdict.one_line_summary","status":"machine_extracted","claim_id":"C3","attestation":"unclaimed"},{"kind":"headline","text":"A multi-agent system automates the full library fuzzing lifecycle by evolving harnesses from runtime feedback.","source":"verdict.pith_extraction.headline","status":"machine_extracted","claim_id":"C4","attestation":"unclaimed"}],"snapshot_sha256":"4cc86e5a17ebbb6fc04c11ad29d7f5f1144205375fae6c2cfde048baf187036f"},"source":{"id":"2605.14431","kind":"arxiv","version":1},"verdict":{"id":"2801638a-0496-4692-aad0-656c59db14f8","model_set":{"reader":"grok-4.3"},"created_at":"2026-05-15T02:11:03.467863Z","strongest_claim":"FuzzAgent completes the full fuzzing lifecycle for all 20 libraries without human intervention and reaches 179619 branches, exceeding OSS-Fuzz, PromptFuzz, PromeFuzz, and OSS-Fuzz-Gen by 45.1%, 73.2%, 92.1%, and 191.2%, respectively. FuzzAgent also identifies 102 genuine library bugs, 78 of which have already been acknowledged and fixed by upstream maintainers.","one_line_summary":"FuzzAgent deploys specialized agents that collaborate on harness generation, execution, and crash triage to evolve fuzzing campaigns, delivering 45-191% more branch coverage than four baselines on 20 C/C++ libraries and surfacing 102 real bugs.","pipeline_version":"pith-pipeline@v0.9.0","weakest_assumption":"That the multi-agent loop can reliably distinguish genuine library bugs from harness-induced crashes and that the runtime feedback signals are sufficient to drive meaningful iterative improvement without human oversight or post-hoc filtering.","pith_extraction_headline":"A multi-agent system automates the full library fuzzing lifecycle by evolving harnesses from runtime feedback."},"references":{"count":109,"sample":[{"doi":"","year":2021,"title":"The art, science, and engineering of fuzzing: A survey,","work_id":"7eb1c52f-310f-4f64-8507-469734ba962d","ref_index":1,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"10.1145/3648468","year":2024,"title":"Fuzzers for stateful systems: Survey and research directions,","work_id":"96bd520b-cc79-4950-b6ed-c90bca206a05","ref_index":2,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2022,"title":"Fuzzing vulnerability discovery techniques: Survey, challenges and future directions,","work_id":"26d4707c-1842-4617-a5c2-912b92626dcf","ref_index":3,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2025,"title":"A survey of fuzzing open-source operating systems,","work_id":"91d6bf54-d346-4092-bbe6-e5189a572d3f","ref_index":4,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2026,"title":"M. Zalewski, “American fuzzy lop,” http://lcamtuf.coredump.cx/afl/, Accessed 2026","work_id":"8bfcadb0-3755-46e9-ac33-9e81a203481b","ref_index":5,"cited_arxiv_id":"","is_internal_anchor":false}],"resolved_work":109,"snapshot_sha256":"07947abaa5829accf4b40877a63d18c5d1e822998919067c9b24bc2d31eb5153","internal_anchors":4},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":"2801638a-0496-4692-aad0-656c59db14f8"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:39:07Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"pz1GebHOi0hzIg11iTqt7sJ2AXlrm6pDn3rN6+KQYYwS02vuxicTKxvqlchzYMWu5aLscQT9gA297ht+5aJXBg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T11:12:00.768809Z"},"content_sha256":"b518d699457df7a65ace87be9da8a987c1d6c0b7d33c21228e4e7a069849798c","schema_version":"1.0","event_id":"sha256:b518d699457df7a65ace87be9da8a987c1d6c0b7d33c21228e4e7a069849798c"},{"event_type":"integrity_finding","subject_pith_number":"pith:2026:SZI5HFTUUZFFVISOAXCQ7F34WG","target":"integrity","payload":{"note":"Identifier '10.1109/sp63933.2026.00110' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"H. Tu, S. Lee, Y . Li, P. Chen, L. Jiang, and M. B ¨ohme, “Cottontail: Large Language Model-Driven Concolic Execution for Highly Structured Test Input Generation,” in2026 IEEE Symposium on Security and Privacy (SP). Los Alamitos, CA, USA: I","arxiv_id":"2605.14431","detector":"doi_compliance","evidence":{"doi":"10.1109/sp63933.2026.00110","arxiv_id":null,"ref_index":10,"raw_excerpt":"H. Tu, S. Lee, Y . Li, P. Chen, L. Jiang, and M. B ¨ohme, “Cottontail: Large Language Model-Driven Concolic Execution for Highly Structured Test Input Generation,” in2026 IEEE Symposium on Security and Privacy (SP). Los Alamitos, CA, USA: IEEE Computer Society, 2026, pp. 2064–2082. [Online]. Available: https://doi.ieeecomputersociety.org/10.1109/SP63933.2026.00110","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":10,"audited_at":"2026-05-19T05:36:49.703513Z","event_type":"pith.integrity.v1","detected_doi":"10.1109/sp63933.2026.00110","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"05357485fde1a36b4efe3b54193ef9f666e9146292c6935906e88f8c0b5088f9","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null,"integrity_event_id":30,"payload_sha256":"89f1331bee8d180eff963790688b08c31554424e032100609c1eebf09e6a205d","signature_b64":"9lPuHtubkeihYLIjDfGfyidEb6bHvctBvR0RN9Kx4DY8rZdkJndDrUJcxjmlG31b8TyQsxK4a1sE+go0rUCRCA==","signing_key_id":"pith-v1-2026-05"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-19T05:41:45Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"J/MoOIE+MvCD6qVXh/8IMZIamkAawI3xbMZ0Dp4xv8kYcu0YAY98fuBMSKg79g55OOqpufnwjG7ab8MxbpgZAg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T11:12:00.769774Z"},"content_sha256":"2ad20cd8cb0c9e0836ae2403b0b9c0cd4af8b3fbc0e8dc9e5da67539095af39b","schema_version":"1.0","event_id":"sha256:2ad20cd8cb0c9e0836ae2403b0b9c0cd4af8b3fbc0e8dc9e5da67539095af39b"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/SZI5HFTUUZFFVISOAXCQ7F34WG/bundle.json","state_url":"https://pith.science/pith/SZI5HFTUUZFFVISOAXCQ7F34WG/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/SZI5HFTUUZFFVISOAXCQ7F34WG/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T11:12:00Z","links":{"resolver":"https://pith.science/pith/SZI5HFTUUZFFVISOAXCQ7F34WG","bundle":"https://pith.science/pith/SZI5HFTUUZFFVISOAXCQ7F34WG/bundle.json","state":"https://pith.science/pith/SZI5HFTUUZFFVISOAXCQ7F34WG/state.json","well_known_bundle":"https://pith.science/.well-known/pith/SZI5HFTUUZFFVISOAXCQ7F34WG/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2026:SZI5HFTUUZFFVISOAXCQ7F34WG","merge_version":"pith-open-graph-merge-v1","event_count":3,"valid_event_count":3,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"7ed1c52e6482e8afdbfab9f7d48a0e24b73febe9719fcf8404921ec9c0b9c633","cross_cats_sorted":["cs.CR"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2026-05-14T06:21:33Z","title_canon_sha256":"9842339855befa574a7ca519d0d9cd5dc42c7b76fed32777468c14ab61665b29"},"schema_version":"1.0","source":{"id":"2605.14431","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.14431","created_at":"2026-05-17T23:39:07Z"},{"alias_kind":"arxiv_version","alias_value":"2605.14431v1","created_at":"2026-05-17T23:39:07Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.14431","created_at":"2026-05-17T23:39:07Z"},{"alias_kind":"pith_short_12","alias_value":"SZI5HFTUUZFF","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_16","alias_value":"SZI5HFTUUZFFVISO","created_at":"2026-05-18T12:33:37Z"},{"alias_kind":"pith_short_8","alias_value":"SZI5HFTU","created_at":"2026-05-18T12:33:37Z"}],"graph_snapshots":[{"event_id":"sha256:b518d699457df7a65ace87be9da8a987c1d6c0b7d33c21228e4e7a069849798c","target":"graph","created_at":"2026-05-17T23:39:07Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":4,"items":[{"attestation":"unclaimed","claim_id":"C1","kind":"strongest_claim","source":"verdict.strongest_claim","status":"machine_extracted","text":"FuzzAgent completes the full fuzzing lifecycle for all 20 libraries without human intervention and reaches 179619 branches, exceeding OSS-Fuzz, PromptFuzz, PromeFuzz, and OSS-Fuzz-Gen by 45.1%, 73.2%, 92.1%, and 191.2%, respectively. FuzzAgent also identifies 102 genuine library bugs, 78 of which have already been acknowledged and fixed by upstream maintainers."},{"attestation":"unclaimed","claim_id":"C2","kind":"weakest_assumption","source":"verdict.weakest_assumption","status":"machine_extracted","text":"That the multi-agent loop can reliably distinguish genuine library bugs from harness-induced crashes and that the runtime feedback signals are sufficient to drive meaningful iterative improvement without human oversight or post-hoc filtering."},{"attestation":"unclaimed","claim_id":"C3","kind":"one_line_summary","source":"verdict.one_line_summary","status":"machine_extracted","text":"FuzzAgent deploys specialized agents that collaborate on harness generation, execution, and crash triage to evolve fuzzing campaigns, delivering 45-191% more branch coverage than four baselines on 20 C/C++ libraries and surfacing 102 real bugs."},{"attestation":"unclaimed","claim_id":"C4","kind":"headline","source":"verdict.pith_extraction.headline","status":"machine_extracted","text":"A multi-agent system automates the full library fuzzing lifecycle by evolving harnesses from runtime feedback."}],"snapshot_sha256":"4cc86e5a17ebbb6fc04c11ad29d7f5f1144205375fae6c2cfde048baf187036f"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Library fuzzing is essential for hardening the software supply chain, but adopting it at scale remains expensive. Practitioners still spend substantial effort on environment setup, struggle to generate harnesses that respect intricate API constraints, and lack reliable means to tell genuine library bugs from harness-induced crashes. Recent LLM-based systems automate parts of this pipeline, yet they typically operate as one-shot code generators that ignore runtime feedback, which limits both the depth of code they reach and the validity of the bugs they report. We argue that effective library f","authors_text":"Fengyi Wu, Hao Chen, Junzhe Yu, Kit Long Hon, Peng Chen, Yunlong Lyu","cross_cats":["cs.CR"],"headline":"A multi-agent system automates the full library fuzzing lifecycle by evolving harnesses from runtime feedback.","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2026-05-14T06:21:33Z","title":"FuzzAgent: Multi-Agent System for Evolutionary Library Fuzzing"},"references":{"count":109,"internal_anchors":4,"resolved_work":109,"sample":[{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":1,"title":"The art, science, and engineering of fuzzing: A survey,","work_id":"7eb1c52f-310f-4f64-8507-469734ba962d","year":2021},{"cited_arxiv_id":"","doi":"10.1145/3648468","is_internal_anchor":false,"ref_index":2,"title":"Fuzzers for stateful systems: Survey and research directions,","work_id":"96bd520b-cc79-4950-b6ed-c90bca206a05","year":2024},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":3,"title":"Fuzzing vulnerability discovery techniques: Survey, challenges and future directions,","work_id":"26d4707c-1842-4617-a5c2-912b92626dcf","year":2022},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":4,"title":"A survey of fuzzing open-source operating systems,","work_id":"91d6bf54-d346-4092-bbe6-e5189a572d3f","year":2025},{"cited_arxiv_id":"","doi":"","is_internal_anchor":false,"ref_index":5,"title":"M. Zalewski, “American fuzzy lop,” http://lcamtuf.coredump.cx/afl/, Accessed 2026","work_id":"8bfcadb0-3755-46e9-ac33-9e81a203481b","year":2026}],"snapshot_sha256":"07947abaa5829accf4b40877a63d18c5d1e822998919067c9b24bc2d31eb5153"},"source":{"id":"2605.14431","kind":"arxiv","version":1},"verdict":{"created_at":"2026-05-15T02:11:03.467863Z","id":"2801638a-0496-4692-aad0-656c59db14f8","model_set":{"reader":"grok-4.3"},"one_line_summary":"FuzzAgent deploys specialized agents that collaborate on harness generation, execution, and crash triage to evolve fuzzing campaigns, delivering 45-191% more branch coverage than four baselines on 20 C/C++ libraries and surfacing 102 real bugs.","pipeline_version":"pith-pipeline@v0.9.0","pith_extraction_headline":"A multi-agent system automates the full library fuzzing lifecycle by evolving harnesses from runtime feedback.","strongest_claim":"FuzzAgent completes the full fuzzing lifecycle for all 20 libraries without human intervention and reaches 179619 branches, exceeding OSS-Fuzz, PromptFuzz, PromeFuzz, and OSS-Fuzz-Gen by 45.1%, 73.2%, 92.1%, and 191.2%, respectively. FuzzAgent also identifies 102 genuine library bugs, 78 of which have already been acknowledged and fixed by upstream maintainers.","weakest_assumption":"That the multi-agent loop can reliably distinguish genuine library bugs from harness-induced crashes and that the runtime feedback signals are sufficient to drive meaningful iterative improvement without human oversight or post-hoc filtering."}},"verdict_id":"2801638a-0496-4692-aad0-656c59db14f8"}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:4ab78df4805a0d8c7906bc9cf70f34b689ab570d93a01724919c98749e97cdb1","target":"record","created_at":"2026-05-17T23:39:07Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"7ed1c52e6482e8afdbfab9f7d48a0e24b73febe9719fcf8404921ec9c0b9c633","cross_cats_sorted":["cs.CR"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2026-05-14T06:21:33Z","title_canon_sha256":"9842339855befa574a7ca519d0d9cd5dc42c7b76fed32777468c14ab61665b29"},"schema_version":"1.0","source":{"id":"2605.14431","kind":"arxiv","version":1}},"canonical_sha256":"9651d39674a64a5aa24e05c50f977cb19ec422150c73a78517125f9231d1ca4f","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"9651d39674a64a5aa24e05c50f977cb19ec422150c73a78517125f9231d1ca4f","first_computed_at":"2026-05-17T23:39:07.132019Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-17T23:39:07.132019Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"pJoU2GJYl1grvXoIPJko7Ljh0vF+TJ8cnT5I7mKEa1KPCHxZpbwgykgTQNSInVgSHcTriPMimoimIdkvrtPCBg==","signature_status":"signed_v1","signed_at":"2026-05-17T23:39:07.132717Z","signed_message":"canonical_sha256_bytes"},"source_id":"2605.14431","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:4ab78df4805a0d8c7906bc9cf70f34b689ab570d93a01724919c98749e97cdb1","sha256:b518d699457df7a65ace87be9da8a987c1d6c0b7d33c21228e4e7a069849798c","sha256:2ad20cd8cb0c9e0836ae2403b0b9c0cd4af8b3fbc0e8dc9e5da67539095af39b"],"state_sha256":"b3c4eb3255132db67e5013fc576cc3e5e49610b843983b28bf96d91313c2e25e"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"f7iPbY+v0aoBZTOprg0OzIlrNqEdm3i1Ess1acpkl6il8owOB/AHknzp+RTpqoydtHVzvoGaye716B30vddSAA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T11:12:00.772302Z","bundle_sha256":"ee124d19145237a616da53d1f690d352b79cfcb565046b83d4cda4bc46e53570"}}