Intro The architectures of software fuzzing setups that authors of security fuzzing tools had originally implemented were fairly simple. In early days of security fuzzing (before 2010) the vast majority of fuzzing engines were writing mangled content to disk files, and then instructed fuzzed binaries where to find them: $ honggfuzz -f INPUT_DIRECTORY -- /usr/bin/djpeg ___FILE___ Here, the placehol