Hello Qubes OS Developers,
My name is Prateek Chaturvedi, a Computer Science Engineering student. I am writing to express my strong interest in the Admin API Fuzzer project for GSoC 2026.
My background is heavily focused on offensive security and Python development. I recently engineered a purple team environment (Project AEGIS) where I scripted automated red-team scenarios to emulate adaptive attacker behavior and built in-memory RASP hooks in Python to intercept runtime exploits. I believe this experience with exploit interception and automated payload injection translates perfectly to building an automated fuzzer for the Admin API.
I have read the Contributor Proposal Guidelines thoroughly. My university midterm exams are running for the next few days (until March 12), so I will be dedicating my time to those immediately.
However, I wanted to introduce myself to the list beforehand. I will be diving into the Qubes API documentation later this week and will submit my formal draft proposal (following the requested template) to this mailing list for community review shortly after my exams conclude.
Are there any specific API documentation pages or previous fuzzing attempts you recommend I review first when I return on Thursday.
Thank you for your time
Prateek Chaturvedi
GitHub: github.com/pk859