Fuzz introspector
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues
Report generation date: 2023-12-08

Project overview: cloud-custodian

High level conclusions

Reachability and coverage overview

Functions statically reachable by fuzzers
6.0%
576 / 9076
Cyclomatic complexity statically reachable by fuzzers
7.00%
2034 / 30236
Runtime code coverage of functions
19.0%
1745 / 9076

Warning: The number of runtime covered functions are larger than the number of reachable functions. This means that Fuzz Introspector found there are more functions covered at runtime than what is considered reachable based on the static analysis. This is a limitation in the analysis as anything covered at runtime is by definition reachable by the fuzzers.
This is likely due to a limitation in the static analysis. In this case, the count of functions covered at runtime is the true value, which means this is what should be considered "achieved" by the fuzzer.

Use the project functions table below to query all functions that were not covered at runtime.

Fuzzers overview

Fuzzer Fuzzer filename Functions Reached Functions unreached Fuzzer depth Files reached Basic blocks reached Cyclomatic complexity Details
fuzz_resources_validate /src/fuzz_resources_validate.py 124 5649 5 32 106 401 fuzz_resources_validate.py
fuzz_resources_parser /src/fuzz_resources_parser.py 25 5744 2 7 14 76 fuzz_resources_parser.py
fuzz_gcp_resources_process /src/fuzz_gcp_resources_process.py 155 11868 8 17 100 499 fuzz_gcp_resources_process.py
fuzz_gcp_actions_validate_process /src/fuzz_gcp_actions_validate_process.py 153 11870 8 17 95 491 fuzz_gcp_actions_validate_process.py
fuzz_query_parser /src/fuzz_query_parser.py 12 12025 2 3 11 37 fuzz_query_parser.py
fuzz_gcp_filters_validate_process /src/fuzz_gcp_filters_validate_process.py 185 14867 9 21 117 592 fuzz_gcp_filters_validate_process.py
fuzz_filters_parser /src/fuzz_filters_parser.py 66 14986 5 8 39 210 fuzz_filters_parser.py
fuzz_actions_validate /src/fuzz_actions_validate.py 55 14998 5 10 32 174 fuzz_actions_validate.py
fuzz_filters_process /src/fuzz_filters_process.py 298 14755 8 30 255 988 fuzz_filters_process.py
fuzz_resources_process /src/fuzz_resources_process.py 473 14581 9 46 386 1560 fuzz_resources_process.py
fuzz_filters_validate /src/fuzz_filters_validate.py 130 14923 8 21 92 422 fuzz_filters_validate.py
fuzz_actions_parser /src/fuzz_actions_parser.py 40 15011 5 7 20 125 fuzz_actions_parser.py
fuzz_actions_process /src/fuzz_actions_process.py 419 14634 15 31 299 1360 fuzz_actions_process.py

Fuzzer details

Fuzzer: fuzz_resources_validate

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 162 65.5%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 85 34.4%
All colors 247 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
33 201 c7n.resources.cloudtrail.UpdateTrail.validate call site: 00201 c7n.resources.ami.SetDeprecation.validate
28 172 c7n.resources.ec2.QueryFilter.validate call site: 00172 c7n.resources.eks.UpdateConfig.validate
13 76 ...fuzz_resources_validate.TestOneInput call site: 00076 c7n.resources.s3.KMSKeyResolverMixin.__init__
12 123 c7n.resources.vpc.DhcpOptionsFilter.validate call site: 00123 c7n.resources.vpc.SetPermissions.validate
11 13 c7n.cache.factory call site: 00013 c7n.cache.SqlKvCache.__init__
9 100 c7n.resources.ec2.DisableApiStop.validate call site: 00100 c7n.resources.rds.ModifyDb.validate
8 3 ...fuzz_resources_validate.TestOneInput call site: 00003 c7n.manager.ResourceManager.__init__
8 90 c7n.resources.s3.KMSKeyResolverMixin.__init__ call site: 00090 c7n.resources.ecr.SetLifecycle.validate
7 136 c7n.resources.glue.SecurityConfigFilter.validate call site: 00136 c7n.resources.cloudfront.BaseUpdateAction.validate
5 154 c7n.resources.kafka.SetMonitoring.validate call site: 00154 c7n.resources.sagemaker.QueryFilter.validate
4 53 ...fuzz_resources_validate.TestOneInput call site: 00053 c7n.actions.core.Action.__init__
3 29 c7n.filters.core.FilterRegistry.factory call site: 00029 c7n.filters.core.BaseValueFilter.__init__

Runtime coverage analysis

Covered functions
1282
Functions that are reachable but not covered
63
Reachable functions
124
Percentage of reachable functions covered
49.19%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_resources_validate 68
c7n.manager 3
c7n.cache 9
c7n.filters.core 10
c7n.registry 1
c7n.resources.s3 1
c7n.resources.ecr 1
c7n.resources.ec2 3
c7n.resources.rds 4
c7n.resources.vpc 8
c7n.resources.ssm 1
c7n.resources.aws 7
c7n.resources.route53 1
c7n.resources.securityhub 3
c7n.resources.glue 1
c7n.resources.cloudfront 4
c7n.resources.health 2
c7n.resources.asg 2
c7n.resources.kafka 3
c7n.resources.ami 6
c7n.resources.sagemaker 2
c7n.resources.efs 1
c7n.resources.account 6
c7n.resources.eks 3
c7n.resources.servicecatalog 1
c7n.resources.rdscluster 2
c7n.resources.redshift 3
c7n.resources.cloudtrail 2
c7n.utils 8
c7n.resources.emr 2
c7n.resources.awslambda 1

Fuzzer: fuzz_resources_parser

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 23 46.9%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 26 53.0%
All colors 49 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
7 35 c7n.resources.sagemaker.QueryFilter.parse call site: 00035 d.items
4 0 EP call site: 00000 c7n.resources.ec2.QueryFilter.parse
4 5 c7n.resources.ec2.QueryFilter.parse call site: 00005 c7n.resources.aws.Arn.parse
4 29 c7n.resources.health.QueryFilter.parse call site: 00029 c7n.resources.sagemaker.QueryFilter.parse
2 43 c7n.resources.sagemaker.QueryFilter.parse call site: 00043 c7n.resources.emr.QueryFilter.parse
2 46 c7n.resources.emr.QueryFilter.parse call site: 00046 c7n.resources.emr.QueryFilter.__init__

Runtime coverage analysis

Covered functions
1282
Functions that are reachable but not covered
16
Reachable functions
25
Percentage of reachable functions covered
36.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_resources_parser 8
c7n.resources.ec2 3
c7n.resources.aws 8
c7n.resources.health 3
c7n.resources.sagemaker 6
c7n.resources.emr 3

Fuzzer: fuzz_gcp_resources_process

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 219 73.9%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 77 26.0%
All colors 296 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
82 159 c7n.utils.jmespath_search call site: 00159 c7n.filters.core.ValueFilter.process_value_type
51 107 ...fuzz_gcp_resources_process.TestOneInput call site: 00107 c7n.filters.core.ValueFilter.match
20 261 ...fuzz_gcp_resources_process.TestOneInput call site: 00261 c7n_gcp.resources.sql.SqlInstanceDelete.disable_protection
11 35 c7n.cache.factory call site: 00035 c7n.cache.SqlKvCache.__init__
10 250 ...fuzz_gcp_resources_process.TestOneInput call site: 00250 c7n_gcp.resources.compute.EffectiveFirewall.process_resource
9 97 c7n.utils.local_session call site: 00097 c7n_gcp.actions.core.MethodAction.get_client
7 84 ...fuzz_gcp_resources_process.TestOneInput call site: 00084 c7n_gcp.resources.resourcemanager.HierarchyAction.load_hierarchy
7 242 ...fuzz_gcp_resources_process.TestOneInput call site: 00242 c7n.utils.local_session
6 282 ...fuzz_gcp_resources_process.TestOneInput call site: 00282 c7n.utils.local_session
5 3 ...fuzz_gcp_resources_process.TestOneInput call site: 00003 fdp.ConsumeUnicodeNoSurrogates
3 51 c7n.filters.core.FilterRegistry.factory call site: 00051 c7n.filters.core.BaseValueFilter.__init__
2 30 ...fuzz_gcp_resources_process.TestOneInput call site: 00030 c7n.policy.get_session_factory

Runtime coverage analysis

Covered functions
1682
Functions that are reachable but not covered
123
Reachable functions
155
Percentage of reachable functions covered
20.65%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_gcp_resources_process 24
c7n.actions.core 7
c7n.filters.core 29
c7n.manager 4
c7n.cache 9
c7n.registry 1
c7n_gcp.query 3
c7n_gcp.resources.resourcemanager 13
c7n_gcp.actions.core 15
c7n.utils 27
c7n.resolver 38
c7n.vendored.distutils.version 3
c7n_gcp.resources.gke 7
c7n_gcp.resources.compute 10
c7n_gcp.resources.sql 7
c7n_gcp.resources.kms 6

Fuzzer: fuzz_gcp_actions_validate_process

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 187 68.7%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 85 31.2%
All colors 272 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
46 148 c7n_gcp.actions.notify.Notify.process call site: 00148 c7n.actions.notify.BaseNotify.expand_variables
31 195 c7n.utils.jmespath_search call site: 00195 c7n.resolver.ValuesFrom.get_values
29 236 ...fuzz_gcp_actions_validate_process.TestOneInput call site: 00236 c7n_gcp.actions.core.MethodAction.process_resource_set
23 71 c7n.filters.core.ValueFilter.validate call site: 00071 c7n.utils.parse_date
20 118 c7n_gcp.actions.labels.LabelDelayedAction.__init__ call site: 00118 c7n.filters.core.ValueFilter.validate
11 35 c7n.cache.factory call site: 00035 c7n.cache.SqlKvCache.__init__
8 227 ...fuzz_gcp_actions_validate_process.TestOneInput call site: 00227 c7n_gcp.actions.cscc.PostFinding.initialize_source
5 3 ...fuzz_gcp_actions_validate_process.TestOneInput call site: 00003 fdp.ConsumeUnicodeNoSurrogates
3 51 c7n.filters.core.FilterRegistry.factory call site: 00051 c7n.filters.core.BaseValueFilter.__init__
2 30 ...fuzz_gcp_actions_validate_process.TestOneInput call site: 00030 c7n.policy.get_session_factory
2 104 ...fuzz_gcp_actions_validate_process.TestOneInput call site: 00104 dateutil.tz.gettz
1 56 c7n.filters.core.FilterRegistry.factory call site: 00056 data.get

Runtime coverage analysis

Covered functions
1684
Functions that are reachable but not covered
119
Reachable functions
153
Percentage of reachable functions covered
22.22%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_gcp_actions_validate_process 28
c7n.actions.core 7
c7n.filters.core 15
c7n.manager 4
c7n.cache 9
c7n.registry 1
c7n.utils 22
c7n.filters.multiattr 2
c7n.filters.waf 1
c7n_gcp.actions.labels 8
c7n_gcp.actions.cscc 16
c7n_gcp.actions.notify 7
c7n.actions.notify 4
c7n.resolver 38
c7n_gcp.actions.core 17
c7n_gcp.resources.sql 1

Fuzzer: fuzz_query_parser

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 13 68.4%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 6 31.5%
All colors 19 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
10 4 c7n.utils.QueryParser.parse call site: 00004 .isinstance
3 0 EP call site: 00000 c7n.utils.QueryParser.parse

Runtime coverage analysis

Covered functions
1680
Functions that are reachable but not covered
9
Reachable functions
12
Percentage of reachable functions covered
25.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_query_parser 5
c7n.utils 6

Fuzzer: fuzz_gcp_filters_validate_process

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 276 77.3%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 81 22.6%
All colors 357 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
67 188 c7n.utils.jmespath_search call site: 00188 c7n.filters.core.ValueFilter.process_value_type
56 131 c7n.utils.local_session call site: 00131 c7n_gcp.filters.sccfindings.SecurityComandCenterFindingsFilter.process_resource
27 277 ...fuzz_gcp_filters_validate_process.TestOneInput call site: 00277 c7n_gcp.filters.iampolicy.IamPolicyFilter.process_resources
27 305 ...fuzz_gcp_filters_validate_process.TestOneInput call site: 00305 c7n_gcp.filters.metrics.GCPMetricsFilter.get_batched_query_filter
23 45 c7n.filters.core.ValueFilter.validate call site: 00045 c7n.utils.parse_date
20 256 ...fuzz_gcp_filters_validate_process.TestOneInput call site: 00256 c7n_gcp.filters.recommender.RecommenderFilter.get_recommendations
14 90 c7n.filters.offhours.Time.get_tz call site: 00090 c7n.filters.core.ValueFilter.validate
6 119 ...fuzz_gcp_filters_validate_process.TestOneInput call site: 00119 c7n_gcp.filters.sccfindings.SecurityComandCenterFindingsFilter.get_findings
6 339 c7n_gcp.filters.alerts.AlertsFilter.get_findings call site: 00339 c7n_gcp.filters.alerts.AlertsFilter.process_resource
5 3 ...fuzz_gcp_filters_validate_process.TestOneInput call site: 00003 fdp.ConsumeUnicodeNoSurrogates
5 71 ...fuzz_gcp_filters_validate_process.TestOneInput call site: 00071 c7n_gcp.filters.recommender.get_recommender_data
4 346 ...fuzz_gcp_filters_validate_process.TestOneInput call site: 00346 datetime.datetime.strptime

Runtime coverage analysis

Covered functions
2150
Functions that are reachable but not covered
152
Reachable functions
185
Percentage of reachable functions covered
17.84%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_gcp_filters_validate_process 33
c7n.actions.core 2
c7n.filters.core 25
c7n_gcp.query 3
c7n.registry 1
c7n_gcp.filters.labels 6
c7n.utils 25
c7n_gcp.filters.metrics 23
c7n_gcp.filters.recommender 23
c7n.filters.multiattr 2
c7n.filters.waf 1
c7n.filters.offhours 3
c7n_gcp.filters.sccfindings 16
c7n.resolver 38
c7n.vendored.distutils.version 3
c7n_gcp.filters.iampolicy 17
c7n_gcp.resources.compute 1
c7n_gcp.resources.cloudrun 2
c7n_gcp.filters.alerts 11
c7n_gcp.filters.timerange 3

Fuzzer: fuzz_filters_parser

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 34 29.3%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 82 70.6%
All colors 116 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
11 33 c7n.cache.factory call site: 00033 c7n.cache.SqlKvCache.__init__
8 103 c7n.filters.offhours.ScheduleParser.expand_day_range call site: 00103 .range
3 7 ...fuzz_filters_parser.TestOneInput call site: 00007 .dict
3 49 c7n.filters.core.FilterRegistry.factory call site: 00049 c7n.filters.core.BaseValueFilter.__init__
2 73 c7n.filters.offhours.OnHour.get_default_schedule call site: 00073 .range
2 78 c7n.filters.offhours.OffHour.get_default_schedule call site: 00078 .range
2 113 c7n.filters.offhours.ScheduleParser.parse call site: 00113 c7n.filters.offhours.ScheduleParser.parse
1 2 ...fuzz_filters_parser.TestOneInput call site: 00002 fdp.ConsumeUnicodeNoSurrogates
1 54 c7n.filters.core.FilterRegistry.factory call site: 00054 data.get
1 61 c7n.actions.core.ActionRegistry.factory call site: 00061 data.get

Runtime coverage analysis

Covered functions
2154
Functions that are reachable but not covered
36
Reachable functions
66
Percentage of reachable functions covered
45.45%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_filters_parser 18
c7n.actions.core 7
c7n.filters.core 11
c7n.manager 4
c7n.cache 9
c7n.registry 1
c7n.filters.offhours 27

Fuzzer: fuzz_actions_validate

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 31 34.4%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 59 65.5%
All colors 90 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
11 34 c7n.cache.factory call site: 00034 c7n.cache.SqlKvCache.__init__
7 74 ...fuzz_actions_validate.TestOneInput call site: 00074 c7n.actions.network.ModifyVpcSecurityGroupsAction.get_action_group_names
4 3 ...fuzz_actions_validate.TestOneInput call site: 00003 fdp.ConsumeUnicodeNoSurrogates
4 85 c7n.utils.C7NJMESPathParser.parse call site: 00085 c7n.utils.jmespath_compile
3 50 c7n.filters.core.FilterRegistry.factory call site: 00050 c7n.filters.core.BaseValueFilter.__init__
1 55 c7n.filters.core.FilterRegistry.factory call site: 00055 data.get
1 62 c7n.actions.core.ActionRegistry.factory call site: 00062 data.get

Runtime coverage analysis

Covered functions
2153
Functions that are reachable but not covered
30
Reachable functions
55
Percentage of reachable functions covered
45.45%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_actions_validate 19
c7n.actions.core 7
c7n.filters.core 11
c7n.manager 4
c7n.cache 9
c7n.registry 1
c7n.actions.notify 2
c7n.actions.network 9
c7n.utils 4

Fuzzer: fuzz_filters_process

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 468 71.7%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 184 28.2%
All colors 652 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
97 438 ...fuzz_filters_process.TestOneInput call site: 00438 c7n.filters.related.RelatedResourceFilter.process_resource
48 182 c7n.resources.load_resources call site: 00182 c7n.policy.PolicyCollection.from_data
44 327 c7n.filters.iamaccess.CrossAccountAccessFilter.get_accounts call site: 00327 c7n.resolver.ValuesFrom.get_values
38 117 ...fuzz_filters_process.TestOneInput call site: 00117 c7n.loader.PolicyLoader.load_data
28 575 ...fuzz_filters_process.TestOneInput call site: 00575 c7n.filters.vpc.NetworkLocation.process_resource
23 75 c7n.filters.core.ValueFilter.validate call site: 00075 c7n.utils.parse_date
23 372 c7n.utils.jmespath_search call site: 00372 c7n.resolver.ValuesFrom._get_resource_values
21 609 c7n.filters.health.HealthEventFilter.process call site: 00609 c7n.filters.health.HealthEventFilter.process_event
19 555 c7n.filters.backup.ConsecutiveAwsBackupsFilter.process call site: 00555 c7n.filters.backup.ConsecutiveAwsBackupsFilter.process_resource_set
15 422 c7n.utils.local_session call site: 00422 c7n.filters.iamanalyzer.AccessAnalyzer.get_findings
14 537 c7n.filters.revisions.Diff.process call site: 00537 c7n.filters.revisions.Diff.get_revisions
12 232 c7n.filters.missing.Missing.__init__ call site: 00232 c7n.filters.missing.Missing.validate

Runtime coverage analysis

Covered functions
2150
Functions that are reachable but not covered
237
Reachable functions
298
Percentage of reachable functions covered
20.47%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_filters_process 42
c7n.actions.core 7
c7n.filters.core 32
c7n.manager 4
c7n.cache 9
c7n.registry 1
c7n.filters.multiattr 9
c7n.utils 31
c7n.filters.waf 1
c7n.filters.offhours 15
c7n.filters.vpc 19
c7n.filters.revisions 16
c7n.filters.missing 4
c7n.loader 24
c7n.structure 13
c7n.resources 17
c7n.policy 10
c7n.ctx 2
c7n.output 5
c7n.provider 4
c7n.filters.iamaccess 15
c7n.resolver 38
c7n.filters.iamanalyzer 13
c7n.filters.related 19
c7n.filters.kms 11
c7n.vendored.distutils.version 3
c7n.filters.backup 15
c7n.filters.policystatement 3
c7n.filters.health 18

Fuzzer: fuzz_resources_process

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 933 83.8%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 180 16.1%
All colors 1113 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
129 779 c7n.resources.shield.SetShieldProtection.process call site: 00779 c7n.resources.account.AccountPasswordPolicy.process
65 480 c7n.filters.iamaccess.CrossAccountAccessFilter.get_accounts call site: 00480 c7n.resolver.ValuesFrom.get_values
58 195 c7n.filters.core.BaseValueFilter.__init__ call site: 00195 c7n.filters.core.ValueFilter.validate
57 625 c7n.resources.airflow.UpdateApacheAirflowEnvironment.process call site: 00625 c7n.resources.account.IAMSummary.process
57 1055 c7n.resources.cloudtrail.DeleteTrail.process call site: 01055 c7n.resources.account.AccountCredentialReport.process
54 412 c7n.resources.awslambda.RemovePolicyStatement.process call site: 00412 c7n.resources.securityhub.PostFinding.process
48 976 c7n.resources.account.CloudTrailEnabled.process call site: 00976 c7n.resources.emr.EMRSecurityConfigurationFilter.process
47 560 c7n.resources.account.AccountCredentialReport.process call site: 00560 c7n.resources.iam.CredentialReport.match
38 373 c7n.utils.get_retry call site: 00373 c7n.utils.get_retry._retry
32 162 ...fuzz_resources_process.TestOneInput call site: 00162 c7n.filters.core.ValueFilter.validate
30 920 c7n.resources.route53.SetQueryLogging.process call site: 00920 c7n.resources.route53.SetQueryLogging.ensure_log_groups
23 105 c7n.filters.core.ValueFilter.validate call site: 00105 c7n.utils.parse_date

Runtime coverage analysis

Covered functions
2149
Functions that are reachable but not covered
350
Reachable functions
473
Percentage of reachable functions covered
26.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_resources_process 91
c7n.actions.core 2
c7n.filters.core 25
c7n.query 3
c7n.registry 1
c7n.resources.cloudtrail 20
c7n.resources.aws 14
botocore.validate 13
botocore.utils 8
c7n.resources.securityhub 32
c7n.filters.waf 1
c7n.filters.multiattr 2
c7n.resources.route53 40
c7n.utils 39
c7n.resources.ec2 2
c7n.resources.sar 7
c7n.resources.ml 3
c7n.resources.s3control 5
c7n.filters.related 2
c7n.resources.batch 10
c7n.element 5
c7n.resources.iam 49
c7n.resources.account 40
c7n.resources.secretsmanager 6
c7n.resources.awslambda 35
botocore.config 13
c7n.resources.s3 20
c7n.resources.ebs 1
c7n.actions.policy 6
c7n.resources.airflow 5
c7n.resources.vpc 2
c7n.resources.code 1
c7n.resources.ami 9
c7n.filters.iamaccess 5
c7n.resolver 38
c7n.resources.elasticsearch 9
c7n.vendored.distutils.version 3
c7n.filters.policystatement 3
c7n.resources.emr 6
c7n.resources.appflow 1
c7n.resources.mq 2
c7n.resources.shield 14
botocore.paginate 58
c7n.resources.sfn 8
c7n.resources.cloudfront 4

Fuzzer: fuzz_filters_validate

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 131 57.4%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 97 42.5%
All colors 228 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
48 177 c7n.resources.load_resources call site: 00177 c7n.policy.PolicyCollection.from_data
38 112 ...fuzz_filters_validate.TestOneInput call site: 00112 c7n.loader.PolicyLoader.load_data
11 34 c7n.cache.factory call site: 00034 c7n.cache.SqlKvCache.__init__
4 3 ...fuzz_filters_validate.TestOneInput call site: 00003 fdp.ConsumeUnicodeNoSurrogates
4 103 ...fuzz_filters_validate.TestOneInput call site: 00103 dateutil.parser.parse
3 50 c7n.filters.core.FilterRegistry.factory call site: 00050 c7n.filters.core.BaseValueFilter.__init__
2 29 ...fuzz_filters_validate.TestOneInput call site: 00029 c7n.policy.get_session_factory
2 75 c7n.filters.offhours.OnHour.get_default_schedule call site: 00075 .range
2 81 c7n.filters.offhours.OffHour.get_default_schedule call site: 00081 .range
2 94 c7n.filters.offhours.Time.get_tz call site: 00094 tz.title
1 55 c7n.filters.core.FilterRegistry.factory call site: 00055 data.get
1 62 c7n.actions.core.ActionRegistry.factory call site: 00062 data.get

Runtime coverage analysis

Covered functions
2151
Functions that are reachable but not covered
90
Reachable functions
130
Percentage of reachable functions covered
30.77%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_filters_validate 28
c7n.actions.core 7
c7n.filters.core 11
c7n.manager 4
c7n.cache 9
c7n.registry 1
c7n.filters.missing 4
c7n.filters.metrics 1
c7n.filters.offhours 11
c7n.filters.multiattr 2
c7n.filters.vpc 2
c7n.filters.revisions 3
c7n.loader 24
c7n.structure 13
c7n.resources 17
c7n.policy 10
c7n.ctx 2
c7n.output 5
c7n.utils 3
c7n.provider 4

Fuzzer: fuzz_actions_parser

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 16 24.2%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 50 75.7%
All colors 66 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
11 33 c7n.cache.factory call site: 00033 c7n.cache.SqlKvCache.__init__
3 49 c7n.filters.core.FilterRegistry.factory call site: 00049 c7n.filters.core.BaseValueFilter.__init__
1 54 c7n.filters.core.FilterRegistry.factory call site: 00054 data.get
1 61 c7n.actions.core.ActionRegistry.factory call site: 00061 data.get

Runtime coverage analysis

Covered functions
2155
Functions that are reachable but not covered
22
Reachable functions
40
Percentage of reachable functions covered
45.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_actions_parser 15
c7n.actions.core 7
c7n.filters.core 11
c7n.manager 4
c7n.cache 9
c7n.registry 1

Fuzzer: fuzz_actions_process

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 461 68.9%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 208 31.0%
All colors 669 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
94 345 botocore.session.ComponentLocator.get_component call site: 00345 botocore.credentials.create_credential_resolver
66 539 c7n.utils.jmespath_search call site: 00539 c7n.resolver.ValuesFrom.get_values
49 162 c7n.utils.get_retry call site: 00162 c7n.credentials.assumed_session.refresh
49 489 c7n.actions.notify.Notify.process call site: 00489 c7n.actions.notify.BaseNotify.expand_variables
31 606 ...fuzz_actions_process.TestOneInput call site: 00606 c7n.actions.autoscaling.AutoscalingBase.process_restore_scaling_options_from_tag
23 69 c7n.filters.core.ValueFilter.validate call site: 00069 c7n.utils.parse_date
20 643 c7n.utils.get_proxy_url call site: 00643 c7n.actions.webhook.Webhook._process_call
17 470 botocore.session.Session.set_config_variable call site: 00470 c7n.utils.local_session
11 35 c7n.cache.factory call site: 00035 c7n.cache.SqlKvCache.__init__
11 445 botocore.session.ComponentLocator.get_component call site: 00445 botocore.session.Session.get_config_variable
10 124 ...fuzz_actions_process.TestOneInput call site: 00124 c7n.actions.autotag.AutoTagUser.get_tag_value
10 327 botocore.session.Session.__init__ call site: 00327 botocore.session.Session.get_config_variable

Runtime coverage analysis

Covered functions
2153
Functions that are reachable but not covered
305
Reachable functions
419
Percentage of reachable functions covered
27.21%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_actions_process 32
c7n.actions.core 7
c7n.filters.core 15
c7n.manager 4
c7n.cache 9
c7n.registry 1
c7n.utils 40
c7n.filters.multiattr 2
c7n.filters.waf 1
c7n.actions.notify 34
c7n.actions.webhook 20
c7n.actions.autotag 9
c7n.actions.invoke 11
botocore.config 13
c7n.credentials 11
botocore.credentials 41
c7n.resources.ebs 1
c7n.resources.s3 20
botocore.session 67
botocore.hooks 27
botocore.compat 1
botocore.configprovider 20
botocore.useragent 8
botocore.utils 23
botocore.httpsession 15
botocore.tokens 4
botocore.monitoring 2
c7n.resolver 38
c7n.actions.autoscaling 22
c7n.actions.metric 4

Runtime coverage analysis

This section shows analysis of runtime coverage data.

For futher technical details on how this section is generated, please see the Glossary .

Complex functions with low coverage

Func name Function total lines Lines covered at runtime percentage covered Reached by fuzzers
c7n.filters.core.ValueFilter.match 38 0 0.0% ['fuzz_gcp_resources_process', 'fuzz_gcp_filters_validate_process', 'fuzz_filters_process', 'fuzz_resources_process']
c7n.filters.core.ValueFilter.process_value_type 64 5 7.812% ['fuzz_gcp_resources_process', 'fuzz_gcp_filters_validate_process', 'fuzz_filters_process', 'fuzz_resources_process']
c7n.resources.ec2.SsmCompliance.process 33 5 15.15% []
c7n.resources.ec2.HasSpecificManagedPolicy.process 32 13 40.62% []
c7n.resources.s3.ConfigS3.handle_BucketLifecycleConfiguration 37 0 0.0% []
c7n.resources.s3.ConfigS3.handle_BucketWebsiteConfiguration 35 14 40.0% []
c7n.resources.s3.assemble_bucket 43 0 0.0% []
c7n.resources.s3.EncryptExtantKeys.process_key 31 0 0.0% ['fuzz_resources_process', 'fuzz_actions_process']
c7n.resources.s3.SetInventory.process_bucket 33 0 0.0% []
c7n.resources.ecr.LifecycleRule.process 32 5 15.62% []
c7n.resources.vpc.ConfigSG.load_resource 35 15 42.85% []
c7n.resources.vpc.SGPermission.__call__ 38 16 42.10% []
c7n.resources.vpc.MissingRoute.process 41 20 48.78% []
c7n.resources.ssm.PostItem.update_items 32 0 0.0% []
c7n.resources.securityhub.PostFinding.get_finding 50 0 0.0% ['fuzz_resources_process']
c7n.resources.asg.ConfigValidFilter.get_asg_errors 42 4 9.523% []
c7n.resources.asg.Resize.process 43 8 18.60% []
c7n.resources.ami.SetPermissions.process_image 48 5 10.41% []
c7n.resources.ebs.SetPermissions.process_image 31 15 48.38% []
c7n.resources.ebs.ModifyableVolume.process 44 5 11.36% []
c7n.resources.iam.ServiceUsage.process 40 10 25.0% []
c7n.resources.account.CloudTrailEnabled.process 98 7 7.142% ['fuzz_resources_process']
c7n.resources.account.ServiceLimit.process_check 44 9 20.45% []
c7n.resources.account.EnableTrail.process 56 5 8.928% []
c7n.resources.account.EnableDataEvents.process 40 4 10.0% []
c7n.resources.account.GlueCatalogEncryptionEnabled.get_target 32 11 34.37% []
c7n.resources.awslambda.VersionTrim.process_lambda 33 5 15.15% ['fuzz_resources_process']
c7n.utils.get_eni_resource_type 56 2 3.571% []
c7n.query.ChildResourceQuery.filter 32 0 0.0% []
results.add 292 124 42.46% []
p.expand_variables 54 9 16.66% []
resource.update 199 34 17.08% []
c7n.tags.TagActionFilter.__call__ 32 4 12.5% []
c7n.filters.vpc.NetworkLocation.process_resource 36 0 0.0% ['fuzz_filters_process']
delta.remove 242 36 14.87% ['fuzz_resources_validate', 'fuzz_gcp_actions_validate_process', 'fuzz_gcp_filters_validate_process', 'fuzz_filters_process', 'fuzz_resources_process', 'fuzz_filters_validate', 'fuzz_actions_process']
params.append 55 8 14.54% []
name.replace 72 12 16.66% []
paginator.paginate 69 13 18.84% ['fuzz_filters_process', 'fuzz_resources_process', 'fuzz_actions_process']
futures.append 270 105 38.88% ['fuzz_resources_process']
botocore.paginate.Paginator.paginate 353 51 14.44% ['fuzz_resources_process']
os.uname 66 33 50.0% []
response.read 94 15 15.95% ['fuzz_gcp_resources_process', 'fuzz_gcp_actions_validate_process', 'fuzz_gcp_filters_validate_process', 'fuzz_filters_process', 'fuzz_resources_process', 'fuzz_actions_process']
v.sort 1276 488 38.24% []
collections.defaultdict.keys 190 61 32.10% []
sources.pop 1578 2 0.126% []
boto3.Session.client 31 14 45.16% ['fuzz_actions_process']
model.schema.get 215 61 28.37% []
botocore.validate.ParamValidator.validate 178 59 33.14% ['fuzz_resources_validate', 'fuzz_resources_process']
m.get_model 257 109 42.41% ['fuzz_filters_process']
boto3.s3.transfer.S3Transfer.upload_file 116 39 33.62% []
c7n.policy.PullMode.run 35 4 11.42% []
yaml.dump 46 22 47.82% []
key.get 258 76 29.45% []
jmespath.functions.Functions.__init__ 228 87 38.15% ['fuzz_gcp_resources_process', 'fuzz_gcp_actions_validate_process', 'fuzz_gcp_filters_validate_process', 'fuzz_filters_process', 'fuzz_resources_process', 'fuzz_actions_process']
provider.initialize_policies 335 172 51.34% []
c7n.schema.specific_error 34 0 0.0% []
c7n.schema.process_resource 42 0 0.0% []
c7n.schema.resource_vocabulary 37 2 5.405% []
c7n.filters.metrics.MetricsFilter.process_resource_set 42 6 14.28% []
action.split 59 16 27.11% []
actions.split 51 23 45.09% []
uri.startswith 41 11 26.82% ['fuzz_gcp_resources_process', 'fuzz_gcp_actions_validate_process', 'fuzz_gcp_filters_validate_process', 'fuzz_filters_process', 'fuzz_resources_process', 'fuzz_actions_process']
botocore.credentials.RefreshableCredentials.create_from_metadata 896 164 18.30% ['fuzz_actions_process']
botocore.session.get_session.set_config_variable 433 232 53.57% []
c.delete_backup 139 47 33.81% []
waiter.wait 41 11 26.82% []
events.append 61 29 47.54% []
findings.append 52 19 36.53% ['fuzz_resources_process']
fields.update 91 21 23.07% ['fuzz_resources_process']
utils.REGION_PARTITION_MAP.get 73 13 17.80% []
tz.title 812 307 37.80% ['fuzz_gcp_filters_validate_process', 'fuzz_filters_process', 'fuzz_filters_validate']
o.rsplit 37 16 43.24% []
botocore.waiter.create_waiter_with_client 152 12 7.894% []
base.pop 31 9 29.03% []
val.lower 90 49 54.44% []
botocore.client.Config 536 114 21.26% []
bucket.setdefault 71 23 32.39% []
botocore.compat.OrderedDict.values 150 76 50.66% []
c7n.resources.elasticache.DeleteElastiCacheCluster.process 33 0 0.0% []
tasks.append 124 30 24.19% []
os.mkdir 66 33 50.0% []
model.refresh 215 61 28.37% []
response.content.iter_chunked 94 15 15.95% []
stream.read 257 109 42.41% []
dateutil.tz.tz.gettz 812 307 37.80% []
fields.items 91 21 23.07% []
delta.total_seconds 242 36 14.87% []
google_auth_httplib2.AuthorizedHttp 91 45 49.45% []
http.client.HTTPConnection 686 147 21.42% []
request.time_series.extend 291 79 27.14% []
pyasn1_modules.pem.readPemBlocksFromFile 39 7 17.94% []
point.interval.end_time.timestamp_pb 184 43 23.36% []
cachetools.LRUCache 592 132 22.29% []
credentials.serialization_data.copy 984 252 25.60% []
google.oauth2.challenges.SecurityKeyChallenge.obtain_challenge_input 44 2 4.545% []
api.Authenticate 202 15 7.425% []
pool.FindMessageTypeByName 353 73 20.67% []
factory.pool.FindMessageTypeByName 153 31 20.26% []
args.pop 271 47 17.34% []
url.find 206 54 26.21% []
connection.get_api_base_url_for_mtls 231 70 30.30% []
download.consume_next_chunk 237 85 35.86% []
upload.transmit_next_chunk 256 83 32.42% []
retry.get_retry_policy_if_conditions_met 214 77 35.98% []
port.split 140 34 24.28% []
checksum.split 255 59 23.13% []
urllib3.response.MultiDecoder 429 86 20.04% []
decoder.decompress 1022 156 15.26% []
urllib3.util.ssl_.create_urllib3_context 192 46 23.95% []
regions.remove 337 70 20.77% []
model.endpoint.get 215 61 28.37% []
collections.deque.append 190 61 32.10% []
botocore.validate.ValidationErrors._format_error 34 0 0.0% []
botocore.session.Session.create_client 37 0 0.0% []
botocore.utils.S3RegionRedirectorv2.redirect_from_error 38 0 0.0% []
botocore.utils.S3RegionRedirector.redirect_from_error 33 0 0.0% []
botocore.compat._windows_shell_split 37 0 0.0% []
botocore.args.ClientArgsCreator.compute_client_args 32 0 0.0% []
botocore.vendored.six.print_.write 44 4 9.090% []
it.next 76 18 23.68% []
botocore.regions.EndpointRulesetResolver.auth_schemes_to_signing_ctx 33 0 0.0% []
botocore.regions.EndpointRulesetResolver.ruleset_error_to_botocore_exception 31 0 0.0% []
emitter.register 838 69 8.233% []
botocore.paginate.PageIterator.__iter__ 42 0 0.0% ['fuzz_resources_process']
botocore.docs.method.document_model_driven_method 52 0 0.0% []
botocore.docs.params.RequestParamsDocumenter._add_member_documentation 34 0 0.0% []

Files and Directories in report

This section shows which files and directories are considered in this report. The main reason for showing this is fuzz introspector may include more code in the reasoning than is desired. This section helps identify if too many files/directories are included, e.g. third party code, which may be irrelevant for the threat model. In the event too much is included, fuzz introspector supports a configuration file that can exclude data from the report. See the following link for more information on how to create a config file: link

Files in report

Source file Reached by Covered by
[] []
google.api.monitoring_pb2 [] []
google.protobuf.internal.field_mask [] []
google.cloud.obsolete [] []
atheris [] []
c7n.resources.ebs ['fuzz_resources_process', 'fuzz_actions_process'] []
c7n.resources.xray [] []
google.iam.v1.logging.audit_data_pb2 [] []
google.cloud.logging_v2.types.logging_metrics [] []
google.auth.environment_vars [] []
c7n.actions.network ['fuzz_actions_validate'] []
google.cloud.storage._helpers [] []
google.cloud.storage.retry [] []
c7n.mu [] []
c7n_gcp.filters.alerts ['fuzz_gcp_filters_validate_process'] []
google.cloud.monitoring_v3.services.group_service.transports.grpc [] []
[] []
google.cloud.storage.client [] []
c7n.resources.sns [] []
c7n_gcp.resources.gke ['fuzz_gcp_resources_process'] []
ctypes [] []
google.cloud.monitoring_v3.services.alert_policy_service.async_client [] []
c7n.resources.devicefarm [] []
google.protobuf.text_encoding [] []
gc [] []
google.auth.compute_engine._metadata [] []
google.cloud.appengine_logging_v1.types.request_log [] []
google.oauth2.utils [] []
botocore.vendored.requests.packages.urllib3 [] []
zlib [] []
google.protobuf.internal.message_listener [] []
pyrate_limiter [] []
google.cloud.monitoring_v3.types.metric_service [] []
c7n.loader ['fuzz_filters_process', 'fuzz_filters_validate'] []
c7n [] []
c7n.resources.workspaces [] []
google.cloud.monitoring_v3.services.alert_policy_service.transports.base [] []
google.api_core.gapic_v1.config_async [] []
google.cloud.monitoring_v3.services.query_service [] []
google.auth.crypt._cryptography_rsa [] []
c7n.actions.autoscaling ['fuzz_actions_process'] []
google_auth_httplib2 [] []
botocore.docs.translator [] []
uuid [] []
c7n.resources.awslambda ['fuzz_resources_validate', 'fuzz_resources_process'] []
pickle [] []
google.cloud.monitoring_v3.types.common [] []
google.protobuf.timestamp_pb2 [] []
google.api_core.grpc_helpers_async [] []
google.api_core.operations_v1.pagers [] []
google.api_core.future [] []
random [] []
google.auth._oauth2client [] []
google.cloud.monitoring_v3.services.service_monitoring_service.transports [] []
google.protobuf.field_mask_pb2 [] []
c7n.resources.redshift ['fuzz_resources_validate'] []
google.auth.transport.mtls [] []
google.protobuf.service [] []
c7n.resources.s3control ['fuzz_resources_process'] []
c7n_gcp.resources.dataflow [] []
google.cloud.monitoring_v3.services.group_service.async_client [] []
botocore.docs.docstring [] []
google.type.fraction_pb2 [] []
google.cloud.storage [] []
pdb [] []
google.type.postal_address_pb2 [] []
google._async_resumable_media.requests.upload [] []
atexit [] []
tempfile [] []
c7n_gcp.utils [] []
c7n_gcp.resources.deploymentmanager [] []
c7n_gcp.resources.bigquery [] []
google.cloud.monitoring_v3.services.notification_channel_service.transports.base [] []
tabulate [] []
google.protobuf.symbol_database [] []
c7n.resources.servicecatalog ['fuzz_resources_validate'] []
google.api_core.operations_v1 [] []
google.cloud.monitoring_v3.services.alert_policy_service.transports [] []
google.protobuf.descriptor_pool [] []
struct [] []
google.cloud.monitoring_v3.services.snooze_service.async_client [] []
c7n_gcp.client [] []
html [] []
traceback [] []
google.auth.credentials [] []
c7n_gcp.resources.loadbalancer [] []
c7n.resources.elasticache [] []
c7n.filters.kms ['fuzz_filters_process'] []
google.cloud.storage.hmac_key [] []
google.cloud.logging_v2.handlers.transports [] []
botocore.configloader [] []
google.resumable_media.common [] []
google.protobuf.compiler.plugin_pb2 [] []
c7n_gcp.actions.labels ['fuzz_gcp_actions_validate_process'] []
google.auth.api_key [] []
botocore.handlers [] []
google.cloud.logging_v2.sink [] []
google.cloud.logging_v2.services.metrics_service_v2.client [] []
google.api.source_info_pb2 [] []
pandas [] []
dateutil [] []
google.resumable_media.requests._request_helpers [] []
google.oauth2._client [] []
google.cloud.monitoring_v3.types.group_service [] []
google.cloud.logging_v2.services.metrics_service_v2.pagers [] []
c7n_gcp.entry [] []
c7n.resources.accessanalyzer [] []
csv [] []
botocore.docs.paginator [] []
botocore.docs.method [] []
botocore.args [] []
google.cloud.logging_v2.gapic_version [] []
google.auth._default [] []
google.auth.transport._aiohttp_requests [] []
c7n.resources.ses [] []
google.api.metric_pb2 [] []
c7n_gcp.resources.source [] []
google.protobuf.pyext.cpp_message [] []
c7n.resources.storagegw [] []
c7n.resources.elb [] []
c7n.filters.waf ['fuzz_gcp_actions_validate_process', 'fuzz_gcp_filters_validate_process', 'fuzz_filters_process', 'fuzz_resources_process', 'fuzz_actions_process'] []
c7n.resources.batch ['fuzz_resources_process'] []
jsonschema [] []
c7n.resources.opsworks [] []
google.cloud.monitoring_v3._dataframe [] []
google.cloud.logging_v2.handlers.transports.sync [] []
google.auth.external_account [] []
c7n.resources.elasticsearch ['fuzz_resources_process'] []
google.iam.v1.iam_policy_pb2_grpc [] []
google.cloud.extended_operations_pb2 [] []
c7n_gcp.resources.mlengine [] []
google.type.month_pb2 [] []
google.protobuf.descriptor_database [] []
google.cloud.logging_v2._helpers [] []
botocore.httpchecksum [] []
google.protobuf.internal.containers [] []
google.cloud.logging_v2.handlers.transports.base [] []
google.logging.type.http_request_pb2 [] []
google.cloud.monitoring_v3.services.group_service.transports [] []
google.cloud.monitoring_v3.services.query_service.transports.grpc [] []
c7n.filters.health ['fuzz_filters_process'] []
google [] []
c7n.resources.config [] []
google._async_resumable_media._download [] []
botocore.docs.params [] []
google.longrunning.operations_grpc_pb2 [] []
google.iam.v1.iam_policy_pb2 [] []
hmac [] []
c7n.actions.notify ['fuzz_gcp_actions_validate_process', 'fuzz_actions_validate', 'fuzz_actions_process'] []
google.cloud.appengine_logging.gapic_version [] []
c7n.resources.glue ['fuzz_resources_validate'] []
c7n.schema [] []
google.cloud.logging_v2.services [] []
google.cloud.logging_v2.types.log_entry [] []
botocore.httpsession ['fuzz_actions_process'] []
aws_xray_sdk [] []
fnmatch [] []
hashlib [] []
google.auth.transport.grpc [] []
string [] []
google.cloud.appengine_logging_v1.gapic_version [] []
re [] []
proto [] []
google.protobuf.type_pb2 [] []
shutil [] []
c7n.resources.apigw [] []
google.auth.transport.requests [] []
google.api_core.gapic_v1.config [] []
google._async_resumable_media.requests._request_helpers [] []
xml [] []
functools [] []
importlib [] []
jsonpatch [] []
c7n.resources.timestream [] []
google.cloud.logging_v2.services.config_service_v2.pagers [] []
c7n_gcp.resources.memstore [] []
google.cloud._testing [] []
google.cloud.monitoring_v3.services.query_service.pagers [] []
c7n.executor [] []
google.type.latlng_pb2 [] []
google.cloud.monitoring_v3.services.group_service [] []
c7n_gcp.resources [] []
botocore.eventstream [] []
c7n.resources.artifact [] []
botocore.vendored [] []
botocore.model [] []
google.cloud.logging_v2.services.config_service_v2.client [] []
textwrap [] []
google.cloud.monitoring_v3.services.notification_channel_service.transports.grpc_asyncio [] []
google.api.billing_pb2 [] []
google.rpc.context.audit_context_pb2 [] []
google.cloud.monitoring_v3.types.uptime [] []
google.cloud.location.locations_pb2 [] []
c7n.resources.sagemaker ['fuzz_resources_validate', 'fuzz_resources_parser'] []
c7n.resources.rdsparamgroup [] []
c7n_gcp.resources.appengine [] []
google.cloud.monitoring_v3.services.service_monitoring_service.transports.grpc [] []
google.cloud.monitoring_v3.types.dropped_labels [] []
google.cloud.monitoring_v3.types.snooze [] []
c7n.commands [] []
c7n.resources.shield ['fuzz_resources_process'] []
operator [] []
c7n.resources.discovery [] []
google.cloud.monitoring_v3.services.service_monitoring_service.transports.grpc_asyncio [] []
c7n.resources.snowball [] []
google.protobuf.descriptor [] []
c7n.resources.gamelift [] []
google.api.client_pb2 [] []
pathlib [] []
c7n.resources.budgets [] []
google.protobuf.json_format [] []
google.cloud.logging_v2._instrumentation [] []
c7n.resources.appstream [] []
pyasn1_modules [] []
boto3 [] []
botocore.compat ['fuzz_actions_process'] []
google.auth.iam [] []
google.type.datetime_pb2 [] []
c7n.actions.policy ['fuzz_resources_process'] []
google.cloud.monitoring_v3.services.group_service.transports.grpc_asyncio [] []
google.protobuf.service_reflection [] []
...fuzz_filters_parser ['fuzz_filters_parser'] []
google.cloud.monitoring_v3.services.service_monitoring_service [] []
c7n.ufuncs.s3crypt [] []
google.cloud.monitoring_v3.services.notification_channel_service.client [] []
google.cloud.logging_v2.services.logging_service_v2.transports.grpc_asyncio [] []
google.auth.transport._custom_tls_signer [] []
google.cloud.logging_v2.logger [] []
google.cloud.monitoring_v3.services [] []
google.cloud.monitoring_v3.services.alert_policy_service [] []
google.api.distribution_pb2 [] []
google.api_core.page_iterator [] []
google.protobuf.internal.well_known_types [] []
google.type.localized_text_pb2 [] []
google.api.visibility_pb2 [] []
google.oauth2._client_async [] []
c7n_gcp.resources.function [] []
...fuzz_resources_process ['fuzz_resources_process'] []
...fuzz_query_parser ['fuzz_query_parser'] []
urllib [] []
google.cloud.client [] []
c7n.resources.fsx [] []
google.cloud.monitoring_v3.services.notification_channel_service [] []
google.cloud.monitoring_v3.types.service_service [] []
botocore.vendored.requests.packages.urllib3.exceptions [] []
c7n.vendored.distutils.version ['fuzz_gcp_resources_process', 'fuzz_gcp_filters_validate_process', 'fuzz_filters_process', 'fuzz_resources_process'] []
c7n.resources.aws ['fuzz_resources_validate', 'fuzz_resources_parser', 'fuzz_resources_process'] []
google.api.monitored_resource_pb2 [] []
google._async_resumable_media.requests.download [] []
google.longrunning.operations_proto_pb2 [] []
c7n.resources.iam ['fuzz_resources_process'] []
google.cloud.monitoring_v3.services.service_monitoring_service.client [] []
c7n.resources.kms [] []
google.oauth2.credentials [] []
jmespath [] []
c7n.resources.cfn [] []
google.auth.crypt._python_rsa [] []
c7n.resources.code ['fuzz_resources_process'] []
google.api_core.page_iterator_async [] []
c7n.actions.core ['fuzz_gcp_resources_process', 'fuzz_gcp_actions_validate_process', 'fuzz_gcp_filters_validate_process', 'fuzz_filters_parser', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_process', 'fuzz_filters_validate', 'fuzz_actions_parser', 'fuzz_actions_process'] []
google.cloud.logging_v2.handlers._monitored_resources [] []
c7n_gcp.output [] []
google.auth._credentials_async [] []
c7n.resources.bedrock [] []
queue [] []
c7n.resources.ami ['fuzz_resources_validate', 'fuzz_resources_process'] []
google.cloud.monitoring_v3.services.metric_service.transports.base [] []
posixpath [] []
subprocess [] []
google.cloud.logging_v2.handlers.container_engine [] []
google.cloud.logging_v2.types.logging [] []
google.cloud.logging_v2.handlers.handlers [] []
google.api_core.rest_helpers [] []
google.oauth2.id_token [] []
google.protobuf.internal.wire_format [] []
google.type.phone_number_pb2 [] []
botocore.docs.bcdoc.docstringparser [] []
google.api_core.general_helpers [] []
google.auth.crypt._helpers [] []
google.cloud.storage.bucket [] []
google.api.quota_pb2 [] []
google.api.annotations_pb2 [] []
google.cloud.environment_vars [] []
google.cloud.monitoring_v3.services.snooze_service.client [] []
google.protobuf.any_pb2 [] []
google.cloud.monitoring_v3.services.uptime_check_service.async_client [] []
google.api_core.gapic_v1.method [] []
botocore.serialize [] []
c7n.resources.dlm [] []
c7n.filters.revisions ['fuzz_filters_process', 'fuzz_filters_validate'] []
google.cloud.exceptions [] []
c7n.filters [] []
botocore.retries.bucket [] []
google.cloud.logging_v2._http [] []
google.api_core.operations_v1.operations_client_config [] []
c7n_gcp.filters [] []
google.auth.transport._http_client [] []
c7n.resources.dynamodb [] []
botocore.utils ['fuzz_resources_process', 'fuzz_actions_process'] []
botocore.compress [] []
...fuzz_actions_process ['fuzz_actions_process'] []
google.rpc.status_pb2 [] []
botocore.retries.adaptive [] []
c7n.resources.quicksight [] []
google.api_core.gapic_v1.method_async [] []
google.protobuf.unknown_fields [] []
c7n.filters.iamanalyzer ['fuzz_filters_process'] []
c7n.handler [] []
google.auth.external_account_authorized_user [] []
c7n.resources.cognito [] []
google.cloud.storage.blob [] []
google.oauth2.reauth [] []
crcmod [] []
google.cloud.logging_v2._gapic [] []
google.cloud.logging [] []
google.cloud.monitoring_v3.services.group_service.client [] []
google.api.usage_pb2 [] []
c7n.resources.simpledb [] []
c7n.resources.ecr ['fuzz_resources_validate'] []
google.cloud.logging_v2.handlers.transports.background_thread [] []
google.cloud.monitoring_v3.services.query_service.transports [] []
google.protobuf.internal.decoder [] []
google.protobuf.pyext [] []
c7n_tencentcloud [] []
google.cloud.monitoring_v3.types.notification [] []
google.protobuf.internal.python_message [] []
google.auth._cloud_sdk [] []
google.cloud.storage._signing [] []
google.cloud.logging_v2.services.metrics_service_v2.transports [] []
c7n_gcp.resources.datafusion [] []
google.api.backend_pb2 [] []
c7n_openstack [] []
google.api_core.datetime_helpers [] []
google.protobuf.message_factory [] []
google.resumable_media._upload [] []
google.protobuf.source_context_pb2 [] []
google.auth.metrics [] []
botocore.endpoint [] []
binascii [] []
google.cloud.appengine_logging_v1.types [] []
c7n.cache ['fuzz_resources_validate', 'fuzz_gcp_resources_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_filters_validate', 'fuzz_actions_parser', 'fuzz_actions_process'] []
google.cloud.logging_v2.services.config_service_v2.transports [] []
google.cloud.logging_v2.services.metrics_service_v2.transports.base [] []
c7n.manager ['fuzz_resources_validate', 'fuzz_gcp_resources_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_filters_validate', 'fuzz_actions_parser', 'fuzz_actions_process'] []
google.cloud.logging_v2.handlers.middleware.request [] []
google.resumable_media._helpers [] []
google.cloud.logging_v2.services.config_service_v2 [] []
google.auth.compute_engine.credentials [] []
google.cloud.monitoring_v3.query [] []
...fuzz_filters_process ['fuzz_filters_process'] []
botocore.retries.quota [] []
c7n.resources.asg ['fuzz_resources_validate'] []
google.cloud.logging_v2.services.metrics_service_v2.transports.grpc [] []
argparse [] []
c7n_gcp.resources.resource_map [] []
os [] []
google.protobuf.testdata [] []
google.protobuf.compiler [] []
warnings [] []
c7n_gcp.resources.cloudbilling [] []
aiohttp [] []
botocore.session ['fuzz_actions_process'] []
google.cloud.logging_v2.handlers.app_engine [] []
c7n.version [] []
c7n_gcp.resources.dataproc [] []
c7n.ctx ['fuzz_filters_process', 'fuzz_filters_validate'] []
unittest [] []
c7n.filters.policystatement ['fuzz_filters_process', 'fuzz_resources_process'] []
google.api.consumer_pb2 [] []
google.iam.v1 [] []
c7n.resources.athena [] []
google.cloud.monitoring_v3.services.notification_channel_service.async_client [] []
c7n.resources.backup [] []
google.cloud.monitoring_v3.services.service_monitoring_service.pagers [] []
google.cloud.logging_v2.types.logging_config [] []
...fuzz_gcp_filters_validate_process ['fuzz_gcp_filters_validate_process'] []
google.type.interval_pb2 [] []
c7n_gcp.resources.armor [] []
google.type.color_pb2 [] []
botocore.docs.example [] []
inspect [] []
c7n.resources.mq ['fuzz_resources_process'] []
...fuzz_actions_parser ['fuzz_actions_parser'] []
base64 [] []
google.protobuf.internal._parameterized [] []
c7n.resources.directconnect [] []
google.protobuf.internal.testing_refleaks [] []
google.type.date_pb2 [] []
mimetypes [] []
google.cloud.monitoring_v3.services.query_service.transports.grpc_asyncio [] []
google.cloud.monitoring_v3.types.alert_service [] []
c7n.resources.account ['fuzz_resources_validate', 'fuzz_resources_process'] []
google.auth.compute_engine [] []
google.protobuf.wrappers_pb2 [] []
google.api.error_reason_pb2 [] []
c7n.resources.kinesis [] []
c7n.actions.webhook ['fuzz_actions_process'] []
google.cloud.logging_v2.services.config_service_v2.transports.grpc [] []
c7n.actions.invoke ['fuzz_actions_process'] []
google.cloud.logging.handlers [] []
botocore.docs.client [] []
google.auth.transport._mtls_helper [] []
c7n_gcp.policy [] []
google.auth.aws [] []
c7n.resources.s3 ['fuzz_resources_validate', 'fuzz_resources_process', 'fuzz_actions_process'] []
botocore.endpoint_provider [] []
c7n_gcp.filters.timerange ['fuzz_gcp_filters_validate_process'] []
c7n_awscc [] []
google.api_core.retry_async [] []
google.iam.v1.logging [] []
google.auth._default_async [] []
google.protobuf.util [] []
google.gapic.metadata.gapic_metadata_pb2 [] []
c7n_left [] []
google.auth.identity_pool [] []
google.longrunning.operations_pb2 [] []
c7n.filters.config [] []
grpc [] []
google.api_core.gapic_v1.client_info [] []
botocore.docs.utils [] []
botocore.crt [] []
google.iam.v1.policy_pb2_grpc [] []
google.api_core.grpc_helpers [] []
google.oauth2._credentials_async [] []
botocore.vendored.requests.packages [] []
enum [] []
c7n.resources.airflow ['fuzz_resources_process'] []
botocore.stub [] []
google.type.calendar_period_pb2 [] []
c7n.filters.multiattr ['fuzz_gcp_actions_validate_process', 'fuzz_gcp_filters_validate_process', 'fuzz_filters_process', 'fuzz_resources_process', 'fuzz_filters_validate', 'fuzz_actions_process'] []
c7n.data [] []
c7n_azure [] []
google.api_core.operation_async [] []
botocore.vendored.requests [] []
botocore.useragent ['fuzz_actions_process'] []
c7n_oci [] []
google.cloud.monitoring_v3.services.snooze_service.transports.base [] []
c7n.cli [] []
c7n_gcp.region [] []
c7n.resources.cw [] []
google.api_core.gapic_v1.routing_header [] []
c7n_gcp.actions.core ['fuzz_gcp_resources_process', 'fuzz_gcp_actions_validate_process'] []
google.api_core.operations_v1.transports.base [] []
c7n_gcp.resources.build [] []
google.protobuf.duration_pb2 [] []
google.oauth2._reauth_async [] []
c7n.resources.sqs [] []
threading [] []
backports [] []
google.api_core [] []
google.cloud.audit [] []
c7n.actions.autotag ['fuzz_actions_process'] []
calendar [] []
botocore.configprovider ['fuzz_actions_process'] []
google.cloud.logging_v2.handlers.structured_log [] []
google.protobuf.internal.type_checkers [] []
google._async_resumable_media._helpers [] []
google.cloud.monitoring.gapic_version [] []
google.cloud.storage.acl [] []
c7n.resources.cloudtrail ['fuzz_resources_validate', 'fuzz_resources_process'] []
botocore.docs.sharedexample [] []
google.cloud.monitoring_v3.types.query_service [] []
c7n_gcp.resources.notebook [] []
c7n.resources.transfer [] []
google.api.resource_pb2 [] []
cffi [] []
c7n.resources.rds ['fuzz_resources_validate'] []
botocore.docs.bcdoc.restdoc [] []
setproctitle [] []
c7n.resources.qldb [] []
c7n.resources.glacier [] []
google.cloud.monitoring_v3.services.service_monitoring_service.async_client [] []
google.auth.impersonated_credentials [] []
c7n.resources.fis [] []
c7n.resources.health ['fuzz_resources_validate', 'fuzz_resources_parser'] []
google.auth.crypt.rsa [] []
botocore.docs.bcdoc [] []
botocore.parsers [] []
google.protobuf.proto_builder [] []
c7n_gcp.resources.osconfig [] []
c7n_gcp.resources.compute ['fuzz_gcp_resources_process', 'fuzz_gcp_filters_validate_process'] []
c7n.filters.metrics ['fuzz_filters_validate'] []
urllib3 [] []
google.cloud.monitoring_v3.types [] []
google.cloud.monitoring_v3.services.notification_channel_service.transports.grpc [] []
c7n.resources.iot [] []
google.api_core.client_options [] []
googleapiclient [] []
google.resumable_media._download [] []
google.logging.type.log_severity_pb2 [] []
c7n.resources.efs ['fuzz_resources_validate'] []
botocore.signers [] []
c7n_gcp.query ['fuzz_gcp_resources_process', 'fuzz_gcp_filters_validate_process'] []
socket [] []
botocore.hooks ['fuzz_actions_process'] []
google.resumable_media.requests [] []
botocore.retries [] []
google.cloud.logging_v2.services.logging_service_v2.transports [] []
c7n.resources.connect [] []
google.cloud.audit.audit_log_pb2 [] []
google.cloud.monitoring_v3.services.notification_channel_service.transports [] []
botocore.loaders [] []
http [] []
c7n_gcp.provider [] []
google.api_core.exceptions [] []
c7n.filters.backup ['fuzz_filters_process'] []
google.cloud.logging_v2 [] []
google.cloud.monitoring_v3.services.metric_service.pagers [] []
botocore.validate ['fuzz_resources_process'] []
c7n.query ['fuzz_resources_process'] []
google.cloud.monitoring_v3.services.alert_policy_service.client [] []
google.api.auth_pb2 [] []
botocore.discovery [] []
google.api.label_pb2 [] []
google.protobuf.internal.encoder [] []
google.cloud.storage.notification [] []
google.protobuf.empty_pb2 [] []
google.oauth2.sts [] []
math [] []
google.type.dayofweek_pb2 [] []
google.auth [] []
google.api_core.client_info [] []
c7n.resources.lakeformation [] []
google.api.documentation_pb2 [] []
botocore.docs [] []
importlib_metadata [] []
google.cloud.monitoring_v3.services.query_service.client [] []
c7n_gcp.handler [] []
google.cloud.logging_v2.services.metrics_service_v2.async_client [] []
google.cloud.monitoring_v3.services.query_service.transports.base [] []
c7n.config [] []
typing_extensions [] []
google.protobuf.internal.enum_type_wrapper [] []
google.protobuf.message [] []
google.cloud.logging.handlers.middleware [] []
c7n.resources.rdscluster ['fuzz_resources_validate'] []
google.api.field_info_pb2 [] []
google.auth.crypt.base [] []
google.cloud.monitoring [] []
copy [] []
c7n.resources.support [] []
c7n.resources.eks ['fuzz_resources_validate'] []
cryptography [] []
c7n_gcp.actions.cscc ['fuzz_gcp_actions_validate_process'] []
google.cloud.storage.batch [] []
google.cloud.logging_v2.services.metrics_service_v2.transports.grpc_asyncio [] []
google.cloud.storage.iam [] []
google.cloud.monitoring_v3.types.span_context [] []
c7n.filters.core ['fuzz_resources_validate', 'fuzz_gcp_resources_process', 'fuzz_gcp_actions_validate_process', 'fuzz_gcp_filters_validate_process', 'fuzz_filters_parser', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_process', 'fuzz_filters_validate', 'fuzz_actions_parser', 'fuzz_actions_process'] []
grpc_gcp [] []
c7n.resources.cloudfront ['fuzz_resources_validate', 'fuzz_resources_process'] []
c7n_gcp.resources.service [] []
google.auth.version [] []
google.api_core.future._helpers [] []
c7n_gcp.resources.pubsub [] []
botocore.retries.standard [] []
google.type.quaternion_pb2 [] []
google.api_core.protobuf_helpers [] []
google.oauth2 [] []
google.protobuf.reflection [] []
google.api_core.operations_v1.abstract_operations_client [] []
c7n_gcp.resources.secret [] []
cachetools [] []
google.auth.pluggable [] []
c7n_gcp.actions.iampolicy [] []
google.cloud.logging_v2.handlers.middleware [] []
google.protobuf.api_pb2 [] []
c7n.resources.route53 ['fuzz_resources_validate', 'fuzz_resources_process'] []
c7n.resources.appflow ['fuzz_resources_process'] []
c7n_gcp.actions.notify ['fuzz_gcp_actions_validate_process'] []
c7n.registry ['fuzz_resources_validate', 'fuzz_gcp_resources_process', 'fuzz_gcp_actions_validate_process', 'fuzz_gcp_filters_validate_process', 'fuzz_filters_parser', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_process', 'fuzz_filters_validate', 'fuzz_actions_parser', 'fuzz_actions_process'] []
botocore.credentials ['fuzz_actions_process'] []
c7n.vendored.distutils.util [] []
google.cloud.logging.handlers.transports [] []
botocore.history [] []
c7n_gcp.resources.kms ['fuzz_gcp_resources_process'] []
google.iam.v1.options_pb2_grpc [] []
google.auth.transport [] []
sqlite3 [] []
google.api.system_parameter_pb2 [] []
botocore.docs.shape [] []
botocore.crt.auth [] []
c7n.resources.ecs [] []
google.api.config_change_pb2 [] []
google.auth.exceptions [] []
awscrt [] []
google.longrunning.operations_proto [] []
google.cloud.monitoring_v3 [] []
c7n.filters.offhours ['fuzz_gcp_filters_validate_process', 'fuzz_filters_parser', 'fuzz_filters_process', 'fuzz_filters_validate'] []
google.cloud.monitoring_v3.services.uptime_check_service [] []
google.api_core.rest_streaming [] []
...fuzz_gcp_actions_validate_process ['fuzz_gcp_actions_validate_process'] []
google.rpc.http_pb2 [] []
google.cloud.logging_v2.client [] []
c7n.filters.missing ['fuzz_filters_process', 'fuzz_filters_validate'] []
google.cloud.logging_v2.services.metrics_service_v2 [] []
google.auth.crypt.es256 [] []
google.rpc.code_pb2 [] []
botocore.vendored.requests.exceptions [] []
google.cloud.logging_v2.services.config_service_v2.async_client [] []
c7n.policy ['fuzz_filters_process', 'fuzz_filters_validate'] []
google.protobuf.internal.api_implementation [] []
botocore.errorfactory [] []
c7n.resources.swf [] []
packaging [] []
google.auth.app_engine [] []
google.cloud.appengine_logging_v1 [] []
botocore.tokens ['fuzz_actions_process'] []
botocore.docs.bcdoc.style [] []
google.cloud.monitoring_v3.services.metric_service [] []
google.api_core.version [] []
google.iam.v1.policy_pb2 [] []
google.api_core.operations_v1.transports.rest [] []
google.api_core.operations_v1.transports [] []
google.cloud.monitoring_v3.services.snooze_service.pagers [] []
botocore [] []
io [] []
c7n.resources.resource_map [] []
c7n.resources.kafka ['fuzz_resources_validate'] []
google.cloud.monitoring_v3.services.service_monitoring_service.transports.base [] []
OpenSSL [] []
c7n_gcp.resources.iam [] []
botocore.waiter [] []
sys [] []
zipfile [] []
c7n_gcp.resources.resourcemanager ['fuzz_gcp_resources_process'] []
google.auth.downscoped [] []
google.cloud.monitoring_v3.services.group_service.transports.base [] []
google.cloud.logging_v2.types [] []
google.cloud.monitoring_v3.services.metric_service.client [] []
itertools [] []
retrying [] []
google.rpc.context.attribute_context_pb2 [] []
google.auth._exponential_backoff [] []
google.cloud.storage.constants [] []
google.cloud.operation [] []
google.api_core.future.polling [] []
google.cloud.monitoring_v3.services.metric_service.transports.grpc [] []
c7n_gcp.resources.cloudrun ['fuzz_gcp_filters_validate_process'] []
c7n.resources.dms [] []
google.cloud.logging_v2.entries [] []
google.auth.jwt [] []
google.cloud.storage.version [] []
c7n.credentials ['fuzz_actions_process'] []
platform [] []
grpc_status [] []
google.cloud.monitoring_v3.services.alert_policy_service.transports.grpc_asyncio [] []
google._upb._message [] []
c7n.resources.ml ['fuzz_resources_process'] []
google.api.control_pb2 [] []
google.protobuf [] []
google.api.logging_pb2 [] []
c7n.resources.waf [] []
botocore.retries.throttling [] []
google.api.routing_pb2 [] []
c7n.sqsexec [] []
google.oauth2._id_token_async [] []
google.oauth2._service_account_async [] []
asyncio [] []
google.protobuf.text_format [] []
typing [] []
google.cloud.monitoring_v3.services.metric_service.transports [] []
google.auth.crypt [] []
google.type.money_pb2 [] []
google._async_resumable_media [] []
c7n_gcp.resources.spanner [] []
google.api_core.future.async_future [] []
google.cloud.monitoring_v3.types.group [] []
c7n.resources.datapipeline [] []
c7n.element ['fuzz_resources_process'] []
c7n.resources.acm [] []
httplib2 [] []
google.rpc.error_details_pb2 [] []
c7n.resources.firewall [] []
google.cloud.logging_v2.handlers [] []
c7n.lookup [] []
c7n_gcp.filters.metrics ['fuzz_gcp_filters_validate_process'] []
google.api_core.operations_v1.operations_client [] []
google.api_core.extended_operation [] []
google.api.endpoint_pb2 [] []
google.longrunning.operations_grpc [] []
botocore.exceptions [] []
google.cloud.monitoring_v3.services.snooze_service [] []
types [] []
botocore.client [] []
google.auth.transport.urllib3 [] []
datetime [] []
google.api.http_pb2 [] []
copyreg [] []
c7n.output ['fuzz_filters_process', 'fuzz_filters_validate'] []
c7n.resources.datasync [] []
c7n_gcp.filters.iampolicy ['fuzz_gcp_filters_validate_process'] []
google.cloud.monitoring_v3.types.mutation_record [] []
botocore.regions [] []
google.api_core.future.base [] []
c7n.resources.vpc ['fuzz_resources_validate', 'fuzz_resources_process'] []
google.api.policy_pb2 [] []
c7n.utils ['fuzz_resources_validate', 'fuzz_gcp_resources_process', 'fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_gcp_filters_validate_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_process', 'fuzz_filters_validate', 'fuzz_actions_process'] []
c7n_gcp.resources.storage [] []
google.api.httpbody_pb2 [] []
c7n.filters.vpc ['fuzz_filters_process', 'fuzz_filters_validate'] []
c7n.resources.emr ['fuzz_resources_validate', 'fuzz_resources_parser', 'fuzz_resources_process'] []
distutils [] []
email [] []
c7n.resources.lex [] []
c7n.vendored.distutils [] []
google.cloud.monitoring_v3.types.alert [] []
google.cloud.monitoring_v3.types.notification_service [] []
c7n.resources.ssm ['fuzz_resources_validate'] []
google.cloud.monitoring_v3.services.snooze_service.transports [] []
weakref [] []
google.iam.v1.options_pb2 [] []
c7n_gcp.resources.bigtable [] []
concurrent [] []
psutil [] []
c7n.resources.quotas [] []
c7n.cwe [] []
c7n.resources.opensearch [] []
c7n_gcp.mu [] []
botocore.docs.service [] []
c7n.reports [] []
c7n.resources.ec2 ['fuzz_resources_validate', 'fuzz_resources_parser', 'fuzz_resources_process'] []
google.resumable_media [] []
google.api_core.bidi [] []
google.cloud.monitoring_v3.types.snooze_service [] []
google.cloud.appengine_logging_v1.services [] []
c7n.structure ['fuzz_filters_process', 'fuzz_filters_validate'] []
...fuzz_filters_validate ['fuzz_filters_validate'] []
c7n.reports.csvout [] []
google.cloud._helpers [] []
c7n.resources.sar ['fuzz_resources_process'] []
google.cloud.logging_v2.services.logging_service_v2.pagers [] []
c7n.resolver ['fuzz_gcp_resources_process', 'fuzz_gcp_actions_validate_process', 'fuzz_gcp_filters_validate_process', 'fuzz_filters_process', 'fuzz_resources_process', 'fuzz_actions_process'] []
google.cloud.monitoring_v3.gapic_version [] []
ipaddress [] []
c7n.resources.lightsail [] []
google.api_core.operation [] []
google.cloud.monitoring_v3.services.notification_channel_service.pagers [] []
google.api_core.retry [] []
c7n_gcp.filters.sccfindings ['fuzz_gcp_filters_validate_process'] []
google.type.expr_pb2 [] []
google._async_resumable_media.requests [] []
pyasn1 [] []
google.cloud.monitoring_v3.services.uptime_check_service.transports.grpc [] []
botocore.retries.base [] []
botocore.paginate ['fuzz_resources_process'] []
google.cloud.monitoring_v3.services.uptime_check_service.pagers [] []
google.cloud.logging_v2.services.config_service_v2.transports.base [] []
...fuzz_resources_parser ['fuzz_resources_parser'] []
requests [] []
google.api_core.iam [] []
c7n_gcp.resources.artifactregistry [] []
google.cloud.monitoring_v3.types.uptime_service [] []
google.cloud.appengine_logging [] []
c7n.resources.secretsmanager ['fuzz_resources_process'] []
xform_name [] []
c7n.ufuncs [] []
c7n.resources ['fuzz_filters_process', 'fuzz_filters_validate'] []
c7n.resources.appelb [] []
google.cloud._http [] []
c7n.resources.guardduty [] []
decimal [] []
rsa [] []
google.api_core.timeout [] []
c7n.actions.metric ['fuzz_actions_process'] []
google.cloud.monitoring_v3.services.metric_service.transports.grpc_asyncio [] []
google.cloud.logging_v2.services.logging_service_v2 [] []
google.cloud.logging_v2.services.config_service_v2.transports.grpc_asyncio [] []
google.api.field_behavior_pb2 [] []
google.cloud.monitoring_v3.services.snooze_service.transports.grpc [] []
botocore.awsrequest [] []
google.cloud.monitoring_v3.services.metric_service.async_client [] []
c7n.resources.elasticbeanstalk [] []
botocore.config ['fuzz_resources_process', 'fuzz_actions_process'] []
sphinx [] []
google.api_core.path_template [] []
c7n.deprecated [] []
logging [] []
google.longrunning.operations_pb2_grpc [] []
google.cloud.monitoring_v3.services.alert_policy_service.transports.grpc [] []
google.cloud.version [] []
c7n.resources.cloudsearch [] []
google.cloud.monitoring_v3.types.metric [] []
c7n.testing [] []
c7n_gcp.actions [] []
google.protobuf.struct_pb2 [] []
getpass [] []
google.protobuf.internal.extension_dict [] []
...fuzz_resources_validate ['fuzz_resources_validate'] []
google._async_resumable_media._upload [] []
c7n.filters.iamaccess ['fuzz_filters_process', 'fuzz_resources_process'] []
botocore.response [] []
c7n_gcp.resources.sql ['fuzz_gcp_resources_process', 'fuzz_gcp_actions_validate_process'] []
collections [] []
google.cloud.monitoring_v3.services.group_service.pagers [] []
botocore.translate [] []
c7n_gcp.resources.logging [] []
google_crc32c [] []
configparser [] []
...fuzz_actions_validate ['fuzz_actions_validate'] []
c7n.filters.related ['fuzz_filters_process', 'fuzz_resources_process'] []
google.type.timeofday_pb2 [] []
time [] []
google.auth._service_account_info [] []
google.cloud.monitoring_v3.services.alert_policy_service.pagers [] []
google.cloud.storage.fileio [] []
c7n.provider ['fuzz_filters_process', 'fuzz_filters_validate'] []
shlex [] []
...fuzz_gcp_resources_process ['fuzz_gcp_resources_process'] []
google.api.log_pb2 [] []
google.protobuf.descriptor_pb2 [] []
google.oauth2.service_account [] []
c7n.resources.securityhub ['fuzz_resources_validate', 'fuzz_resources_process'] []
google.oauth2.challenges [] []
google.cloud.storage._http [] []
c7n_gcp.resources.network [] []
google.api.launch_stage_pb2 [] []
botocore.retries.special [] []
google.cloud.monitoring_v3.services.uptime_check_service.client [] []
google.cloud.storage.transfer_manager [] []
google.auth._jwt_async [] []
argcomplete [] []
c7n.resources.inspector2 [] []
google.cloud.logging_v2.services.logging_service_v2.transports.grpc [] []
google.cloud.monitoring_v3.services.uptime_check_service.transports [] []
gzip [] []
google.cloud.monitoring_v3.services.query_service.async_client [] []
c7n.actions [] []
json [] []
botocore.monitoring ['fuzz_actions_process'] []
c7n.resources.pinpoint [] []
c7n.exceptions [] []
google.cloud.logging_v2.handlers._helpers [] []
google.cloud.monitoring_v3.services.snooze_service.transports.grpc_asyncio [] []
botocore.auth [] []
c7n.resources.appsync [] []
google.cloud.monitoring_v3.types.service [] []
google.api_core.gapic_v1 [] []
google.cloud.monitoring_v3.services.uptime_check_service.transports.grpc_asyncio [] []
c7n.tags [] []
botocore.retryhandler [] []
contextlib [] []
google.auth._helpers [] []
c7n_gcp.filters.labels ['fuzz_gcp_filters_validate_process'] []
google.oauth2.gdch_credentials [] []
c7n.resources.directory [] []
google.protobuf.internal.builder [] []
c7n.resources.sfn ['fuzz_resources_process'] []
google.cloud.logging_v2.metric [] []
flask [] []
google.api.context_pb2 [] []
botocore.vendored.six [] []
c7n_kube [] []
google.resumable_media.requests.upload [] []
google.cloud.logging_v2.services.logging_service_v2.transports.base [] []
google.type.decimal_pb2 [] []
google.api.service_pb2 [] []
c7n.resources.hsm [] []
c7n_gcp.resources.dns [] []
certifi [] []
c7n_gcp.filters.recommender ['fuzz_gcp_filters_validate_process'] []
google.cloud.logging_v2.services.logging_service_v2.client [] []
google.cloud.logging_v2.resource [] []
google.cloud.logging.gapic_version [] []
c7n_gcp [] []
google.protobuf.internal [] []
c7n.log [] []
yaml [] []
botocore.docs.waiter [] []
c7n.varfmt [] []
google.resumable_media.requests.download [] []
google.cloud.monitoring_v3.services.uptime_check_service.transports.base [] []
google.cloud.logging_v2.services.logging_service_v2.async_client [] []
google.api_core.operations_v1.operations_async_client [] []

Directories in report

Directory

Metadata section

This sections shows the raw data that is used to produce this report. This is mainly used for further processing and developer debugging.

Fuzzer Calltree file Program data file Coverage file
fuzz_resources_validate fuzzerLogFile-fuzz_resources_validate.data fuzzerLogFile-fuzz_resources_validate.data.yaml all_cov.json
fuzz_resources_parser fuzzerLogFile-fuzz_resources_parser.data fuzzerLogFile-fuzz_resources_parser.data.yaml all_cov.json
fuzz_gcp_resources_process fuzzerLogFile-fuzz_gcp_resources_process.data fuzzerLogFile-fuzz_gcp_resources_process.data.yaml all_cov.json
fuzz_gcp_actions_validate_process fuzzerLogFile-fuzz_gcp_actions_validate_process.data fuzzerLogFile-fuzz_gcp_actions_validate_process.data.yaml all_cov.json
fuzz_query_parser fuzzerLogFile-fuzz_query_parser.data fuzzerLogFile-fuzz_query_parser.data.yaml all_cov.json
fuzz_gcp_filters_validate_process fuzzerLogFile-fuzz_gcp_filters_validate_process.data fuzzerLogFile-fuzz_gcp_filters_validate_process.data.yaml all_cov.json
fuzz_filters_parser fuzzerLogFile-fuzz_filters_parser.data fuzzerLogFile-fuzz_filters_parser.data.yaml all_cov.json
fuzz_actions_validate fuzzerLogFile-fuzz_actions_validate.data fuzzerLogFile-fuzz_actions_validate.data.yaml all_cov.json
fuzz_filters_process fuzzerLogFile-fuzz_filters_process.data fuzzerLogFile-fuzz_filters_process.data.yaml all_cov.json
fuzz_resources_process fuzzerLogFile-fuzz_resources_process.data fuzzerLogFile-fuzz_resources_process.data.yaml all_cov.json
fuzz_filters_validate fuzzerLogFile-fuzz_filters_validate.data fuzzerLogFile-fuzz_filters_validate.data.yaml all_cov.json
fuzz_actions_parser fuzzerLogFile-fuzz_actions_parser.data fuzzerLogFile-fuzz_actions_parser.data.yaml all_cov.json
fuzz_actions_process fuzzerLogFile-fuzz_actions_process.data fuzzerLogFile-fuzz_actions_process.data.yaml all_cov.json