Fuzz introspector
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues
Report generation date: 2025-08-29

Project overview: cloud-custodian

High level conclusions

Reachability and coverage overview

Functions statically reachable by fuzzers
6.0%
592 / 9943
Cyclomatic complexity statically reachable by fuzzers
6.0%
2099 / 33227
Runtime code coverage of functions
18.0%
1764 / 9943

Warning: The number of runtime covered functions are larger than the number of reachable functions. This means that Fuzz Introspector found there are more functions covered at runtime than what is considered reachable based on the static analysis. This is a limitation in the analysis as anything covered at runtime is by definition reachable by the fuzzers.
This is likely due to a limitation in the static analysis. In this case, the count of functions covered at runtime is the true value, which means this is what should be considered "achieved" by the fuzzer.

Use the project functions table below to query all functions that were not covered at runtime.

Fuzzers overview

Fuzzer Fuzzer filename Functions Reached Functions unreached Fuzzer depth Files reached Basic blocks reached Cyclomatic complexity Details
fuzz_filters_parser /src/fuzz_filters_parser.py 66 16581 5 8 39 210 fuzz_filters_parser.py
fuzz_query_parser /src/fuzz_query_parser.py 12 16655 2 3 11 37 fuzz_query_parser.py
fuzz_gcp_filters_validate_process /src/fuzz_gcp_filters_validate_process.py 241 16406 11 23 168 781 fuzz_gcp_filters_validate_process.py
fuzz_filters_validate /src/fuzz_filters_validate.py 129 16520 8 21 94 419 fuzz_filters_validate.py
fuzz_actions_validate /src/fuzz_actions_validate.py 55 16593 5 10 32 174 fuzz_actions_validate.py
fuzz_gcp_actions_validate_process /src/fuzz_gcp_actions_validate_process.py 198 16449 10 19 124 639 fuzz_gcp_actions_validate_process.py
fuzz_filters_process /src/fuzz_filters_process.py 356 16293 10 32 317 1186 fuzz_filters_process.py
fuzz_resources_parser /src/fuzz_resources_parser.py 25 16644 2 7 14 76 fuzz_resources_parser.py
fuzz_resources_process /src/fuzz_resources_process.py 476 16174 10 45 392 1573 fuzz_resources_process.py
fuzz_actions_process /src/fuzz_actions_process.py 463 16185 15 31 329 1506 fuzz_actions_process.py
fuzz_actions_parser /src/fuzz_actions_parser.py 40 16606 5 7 20 125 fuzz_actions_parser.py
fuzz_gcp_resources_process /src/fuzz_gcp_resources_process.py 213 16435 10 19 151 694 fuzz_gcp_resources_process.py
fuzz_resources_validate /src/fuzz_resources_validate.py 137 16535 7 35 115 444 fuzz_resources_validate.py

Project functions overview

The following table shows data about each function in the project. The functions included in this table correspond to all functions that exist in the executables of the fuzzers. As such, there may be functions that are from third-party libraries.

For further technical details on the meaning of columns in the below table, please see the Glossary .

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzzer details

Fuzzer: fuzz_filters_parser

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 76 65.5%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 40 34.4%
All colors 116 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
31 82 ...fuzz_filters_parser.TestOneInput call site: 00082 c7n.filters.offhours.ScheduleParser.parse_resource_schedule
13 68 ...fuzz_filters_parser.TestOneInput call site: 00068 c7n.filters.offhours.OnHour.get_default_schedule
11 33 c7n.cache.factory call site: 00033 c7n.cache.SqlKvCache.__init__
6 46 c7n.manager.ResourceManager.__init__ call site: 00046 c7n.filters.core.FilterRegistry.factory
5 59 c7n.manager.ResourceManager.__init__ call site: 00059 c7n.actions.core.ActionRegistry.factory
3 53 c7n.filters.core.BaseValueFilter.__init__ call site: 00053 c7n.registry.PluginRegistry.get
2 5 ...fuzz_filters_parser.FuzzOption.__init__ call site: 00005 ...fuzz_filters_parser._generate_random_dict
1 0 EP call site: 00000 atheris.FuzzedDataProvider
1 14 ...fuzz_filters_parser.TestOneInput call site: 00014 fdp.PickValueInList
1 27 c7n.filters.core.FilterRegistry.__init__ call site: 00027 ...fuzz_filters_parser.FuzzContext.__init__
1 30 ...fuzz_filters_parser.FuzzContext.__init__ call site: 00030 c7n.manager.ResourceManager.__init__
1 57 c7n.registry.PluginRegistry.get call site: 00057 results.append

Runtime coverage analysis

Covered functions
2136
Functions that are reachable but not covered
45
Reachable functions
66
Percentage of reachable functions covered
31.82%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_filters_parser 18
c7n.actions.core 7
c7n.filters.core 11
c7n.manager 4
c7n.cache 9
c7n.registry 1
c7n.filters.offhours 27

Fuzzer: fuzz_query_parser

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 15 78.9%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 4 21.0%
All colors 19 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
12 4 c7n.utils.QueryParser.parse call site: 00004 c7n.utils.C7NJMESPathParser.parse
3 0 EP call site: 00000 c7n.utils.QueryParser.parse

Runtime coverage analysis

Covered functions
2130
Functions that are reachable but not covered
9
Reachable functions
12
Percentage of reachable functions covered
25.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_query_parser 5
c7n.utils 6

Fuzzer: fuzz_gcp_filters_validate_process

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 373 80.2%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 92 19.7%
All colors 465 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
233 178 ...fuzz_gcp_filters_validate_process.TestOneInput call site: 00178 c7n_gcp.filters.sccfindings.SecurityComandCenterFindingsFilter.process_resource
26 126 c7n.utils.local_session call site: 00126 c7n_gcp.filters.metrics.GCPMetricsFilter.get_batched_query_filter
26 417 ...fuzz_gcp_filters_validate_process.TestOneInput call site: 00417 c7n_gcp.filters.iampolicy.IamPolicyFilter.process_resources
23 56 c7n.filters.core.ValueFilter.validate call site: 00056 c7n.utils.parse_date
21 153 ...fuzz_gcp_filters_validate_process.TestOneInput call site: 00153 c7n_gcp.filters.recommender.RecommenderFilter.match_resources
6 82 ...fuzz_gcp_filters_validate_process.TestOneInput call site: 00082 c7n.filters.offhours.Time.get_tz
6 450 c7n_gcp.filters.alerts.AlertsFilter.get_findings call site: 00450 c7n_gcp.filters.alerts.AlertsFilter.process_resource
5 45 ...fuzz_gcp_filters_validate_process.TestOneInput call site: 00045 c7n_gcp.filters.recommender.get_recommender_data
4 6 ...fuzz_gcp_filters_validate_process.FuzzOption.__init__ call site: 00006 ...fuzz_gcp_filters_validate_process._generate_random_dict
4 116 ...fuzz_gcp_filters_validate_process.TestOneInput call site: 00116 c7n.utils.local_session
4 457 ...fuzz_gcp_filters_validate_process.TestOneInput call site: 00457 datetime.datetime.strptime
3 89 ...fuzz_gcp_filters_validate_process.TestOneInput call site: 00089 .set

Runtime coverage analysis

Covered functions
2136
Functions that are reachable but not covered
204
Reachable functions
241
Percentage of reachable functions covered
15.35%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_gcp_filters_validate_process 32
c7n.actions.core 2
c7n.filters.core 25
c7n_gcp.query 3
c7n.registry 1
c7n_gcp.filters.labels 6
c7n_gcp.filters.recommender 23
c7n.filters.waf 1
c7n_gcp.filters.metrics 23
c7n.utils 25
c7n.filters.offhours 3
c7n.filters.multiattr 2
c7n_gcp.filters.sccfindings 16
c7n.resolver 51
botocore.paginate 55
botocore.utils 4
c7n.vendored.distutils.version 3
c7n_gcp.filters.iampolicy 16
c7n_gcp.resources.cloudrun 2
c7n_gcp.resources.compute 1
c7n_gcp.filters.alerts 11
c7n_gcp.filters.timerange 3

Fuzzer: fuzz_filters_validate

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 178 78.0%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 50 21.9%
All colors 228 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
114 95 ...fuzz_filters_validate.TestOneInput call site: 00095 c7n.loader.PolicyLoader.load_data
12 71 ...fuzz_filters_validate.TestOneInput call site: 00071 c7n.filters.offhours.OffHour.get_default_schedule
11 34 c7n.cache.factory call site: 00034 c7n.cache.SqlKvCache.__init__
6 47 c7n.manager.ResourceManager.__init__ call site: 00047 c7n.filters.core.FilterRegistry.factory
5 60 c7n.manager.ResourceManager.__init__ call site: 00060 c7n.actions.core.ActionRegistry.factory
5 210 ...fuzz_filters_validate.TestOneInput call site: 00210 c7n.filters.offhours.Time.get_tz
4 90 ...fuzz_filters_validate.TestOneInput call site: 00090 dateutil.parser.parse
3 54 c7n.filters.core.BaseValueFilter.__init__ call site: 00054 c7n.registry.PluginRegistry.get
3 219 ...fuzz_filters_validate.TestOneInput call site: 00219 .set
3 224 ...fuzz_filters_validate.TestOneInput call site: 00224 .set
2 9 ...fuzz_filters_validate._generate_random_dict call site: 00009 fdp.ConsumeIntInRange
1 1 ...fuzz_filters_validate.TestOneInput call site: 00001 fdp.ConsumeIntInRange

Runtime coverage analysis

Covered functions
2138
Functions that are reachable but not covered
102
Reachable functions
129
Percentage of reachable functions covered
20.93%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_filters_validate 28
c7n.actions.core 7
c7n.filters.core 11
c7n.manager 4
c7n.cache 9
c7n.registry 1
c7n.filters.missing 4
c7n.filters.metrics 1
c7n.filters.offhours 10
c7n.filters.revisions 3
c7n.loader 24
c7n.structure 13
c7n.resources 17
c7n.policy 10
c7n.ctx 2
c7n.output 5
c7n.utils 3
c7n.provider 4
c7n.filters.vpc 2
c7n.filters.multiattr 2

Fuzzer: fuzz_actions_validate

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 46 51.1%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 44 48.8%
All colors 90 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
11 34 c7n.cache.factory call site: 00034 c7n.cache.SqlKvCache.__init__
7 73 ...fuzz_actions_validate.TestOneInput call site: 00073 c7n.actions.network.ModifyVpcSecurityGroupsAction.get_action_group_names
6 47 c7n.manager.ResourceManager.__init__ call site: 00047 c7n.filters.core.FilterRegistry.factory
5 60 c7n.manager.ResourceManager.__init__ call site: 00060 c7n.actions.core.ActionRegistry.factory
4 28 c7n.filters.core.FilterRegistry.__init__ call site: 00028 c7n.manager.ResourceManager.__init__
4 84 c7n.utils.C7NJMESPathParser.parse call site: 00084 c7n.utils.jmespath_compile
3 54 c7n.filters.core.BaseValueFilter.__init__ call site: 00054 c7n.registry.PluginRegistry.get
2 69 ...fuzz_actions_validate.TestOneInput call site: 00069 .super
1 0 EP call site: 00000 atheris.FuzzedDataProvider
1 3 ...fuzz_actions_validate.TestOneInput call site: 00003 fdp.ConsumeUnicodeNoSurrogates
1 14 ...fuzz_actions_validate._generate_random_dict call site: 00014 ...fuzz_actions_validate._generate_random_dict
1 58 c7n.registry.PluginRegistry.get call site: 00058 results.append

Runtime coverage analysis

Covered functions
2138
Functions that are reachable but not covered
34
Reachable functions
55
Percentage of reachable functions covered
38.18%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_actions_validate 19
c7n.actions.core 7
c7n.filters.core 11
c7n.manager 4
c7n.cache 9
c7n.registry 1
c7n.actions.notify 2
c7n.actions.network 9
c7n.utils 4

Fuzzer: fuzz_gcp_actions_validate_process

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 258 73.0%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 95 26.9%
All colors 353 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
189 121 c7n_gcp.actions.notify.Notify.process call site: 00121 c7n.actions.notify.BaseNotify.expand_variables
26 311 ...fuzz_gcp_actions_validate_process.TestOneInput call site: 00311 c7n_gcp.actions.cscc.PostFinding.get_resource_params
11 35 c7n.cache.factory call site: 00035 c7n.cache.SqlKvCache.__init__
8 338 ...fuzz_gcp_actions_validate_process.TestOneInput call site: 00338 c7n_gcp.actions.cscc.PostFinding.initialize_source
6 48 c7n.manager.ResourceManager.__init__ call site: 00048 c7n.filters.core.FilterRegistry.factory
5 61 c7n.manager.ResourceManager.__init__ call site: 00061 c7n.actions.core.ActionRegistry.factory
3 55 c7n.filters.core.BaseValueFilter.__init__ call site: 00055 c7n.registry.PluginRegistry.get
3 74 ...fuzz_gcp_actions_validate_process.TestOneInput call site: 00074 .set
2 81 ...fuzz_gcp_actions_validate_process.TestOneInput call site: 00081 dateutil.tz.gettz
1 59 c7n.registry.PluginRegistry.get call site: 00059 results.append
1 69 ...fuzz_gcp_actions_validate_process.TestOneInput call site: 00069 .super
1 71 ...fuzz_gcp_actions_validate_process.TestOneInput call site: 00071 .super

Runtime coverage analysis

Covered functions
2138
Functions that are reachable but not covered
164
Reachable functions
198
Percentage of reachable functions covered
17.17%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_gcp_actions_validate_process 27
c7n.actions.core 7
c7n.filters.core 11
c7n.manager 4
c7n.cache 9
c7n.registry 1
c7n.filters.waf 1
c7n.filters.multiattr 2
c7n_gcp.actions.cscc 16
c7n_gcp.actions.labels 8
c7n_gcp.actions.notify 7
c7n.utils 15
c7n.actions.notify 4
c7n.resolver 51
botocore.paginate 55
botocore.utils 4
c7n_gcp.actions.core 14
c7n_gcp.resources.sql 1

Fuzzer: fuzz_filters_process

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 636 83.5%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 125 16.4%
All colors 761 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
353 337 c7n.utils.local_session call site: 00337 c7n.filters.vpc.SubnetFilter.process
114 78 ...fuzz_filters_process.TestOneInput call site: 00078 c7n.loader.PolicyLoader.load_data
66 693 c7n.vendored.distutils.version.LooseVersion.parse call site: 00693 c7n.filters.health.HealthEventFilter.process
23 194 c7n.filters.core.ValueFilter.validate call site: 00194 c7n.utils.parse_date
17 314 ...fuzz_filters_process.TestOneInput call site: 00314 c7n.filters.iamanalyzer.AccessAnalyzer.process
13 243 ...fuzz_filters_process.TestOneInput call site: 00243 c7n.filters.offhours.OnHour.get_default_schedule
11 35 c7n.cache.factory call site: 00035 c7n.cache.SqlKvCache.__init__
6 48 c7n.manager.ResourceManager.__init__ call site: 00048 c7n.filters.core.FilterRegistry.factory
5 61 c7n.manager.ResourceManager.__init__ call site: 00061 c7n.actions.core.ActionRegistry.factory
5 72 ...fuzz_filters_process.TestOneInput call site: 00072 c7n.filters.offhours.Time.get_tz
4 3 ...fuzz_filters_process.TestOneInput call site: 00003 fdp.ConsumeUnicodeNoSurrogates
4 226 ...fuzz_filters_process.TestOneInput call site: 00226 dateutil.parser.parse

Runtime coverage analysis

Covered functions
2136
Functions that are reachable but not covered
314
Reachable functions
356
Percentage of reachable functions covered
11.8%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_filters_process 41
c7n.actions.core 7
c7n.filters.core 32
c7n.manager 4
c7n.cache 9
c7n.registry 1
c7n.filters.multiattr 9
c7n.filters.offhours 15
c7n.filters.missing 4
c7n.loader 24
c7n.structure 13
c7n.resources 17
c7n.policy 10
c7n.ctx 2
c7n.output 5
c7n.utils 31
c7n.provider 4
c7n.filters.waf 1
c7n.filters.vpc 21
c7n.filters.revisions 16
c7n.filters.policystatement 3
c7n.filters.iamanalyzer 13
c7n.filters.iamaccess 15
c7n.resolver 51
botocore.paginate 55
botocore.utils 4
c7n.filters.kms 12
c7n.filters.related 15
c7n.vendored.distutils.version 3
c7n.filters.backup 15
c7n.filters.health 18

Fuzzer: fuzz_resources_parser

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 25 51.0%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 24 48.9%
All colors 49 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
7 35 c7n.resources.sagemaker.QueryFilter.parse call site: 00035 d.items
4 0 EP call site: 00000 c7n.resources.ec2.QueryFilter.parse
4 5 c7n.resources.ec2.QueryFilter.parse call site: 00005 c7n.resources.aws.Arn.parse
4 29 c7n.resources.health.QueryFilter.parse call site: 00029 c7n.resources.sagemaker.QueryFilter.parse
2 26 c7n.resources.aws.Arn.parse call site: 00026 c7n.resources.health.QueryFilter.parse
2 43 c7n.resources.sagemaker.QueryFilter.parse call site: 00043 c7n.resources.emr.QueryFilter.parse
2 46 c7n.resources.emr.QueryFilter.parse call site: 00046 c7n.resources.emr.QueryFilter.__init__

Runtime coverage analysis

Covered functions
2130
Functions that are reachable but not covered
16
Reachable functions
25
Percentage of reachable functions covered
36.0%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_resources_parser 8
c7n.resources.ec2 3
c7n.resources.aws 8
c7n.resources.health 3
c7n.resources.sagemaker 6
c7n.resources.emr 3

Fuzzer: fuzz_resources_process

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 971 86.5%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 151 13.4%
All colors 1122 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
464 305 c7n.utils.get_retry call site: 00305 c7n.resources.account.AccessAnalyzer.process
349 772 c7n.vendored.distutils.version.LooseVersion.parse call site: 00772 c7n.resources.account.AccountPasswordPolicy.process
35 213 ...fuzz_resources_process.TestOneInput call site: 00213 c7n.resources.s3control.AccessPointCrossAccount.process
30 274 c7n.resources.s3control.AccessPointCrossAccount.process call site: 00274 c7n.resources.securityhub.SecurityHubFindingFilter.process
23 101 c7n.filters.core.ValueFilter.validate call site: 00101 c7n.utils.parse_date
16 70 botocore.validate.ParamValidator._check_special_validation_cases call site: 00070 botocore.validate.ParamValidator._validate_document
11 132 ...fuzz_resources_process.TestOneInput call site: 00132 c7n.resources.cloudtrail.UpdateTrail.validate
7 8 ...fuzz_resources_process.TestOneInput call site: 00008 ...fuzz_resources_process._generate_random_dict
5 40 ...fuzz_resources_process.TestOneInput call site: 00040 c7n.query.QueryResourceManager.__init__
4 3 ...fuzz_resources_process.TestOneInput call site: 00003 fdp.ConsumeUnicodeNoSurrogates
3 32 ...fuzz_resources_process.TestOneInput call site: 00032 c7n.query.QueryResourceManager.get_source
3 89 ...fuzz_resources_process.TestOneInput call site: 00089 .set

Runtime coverage analysis

Covered functions
2130
Functions that are reachable but not covered
397
Reachable functions
476
Percentage of reachable functions covered
16.6%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_resources_process 89
c7n.actions.core 2
c7n.filters.core 25
c7n.query 3
c7n.registry 1
c7n.filters.waf 1
c7n.resources.cloudtrail 20
c7n.resources.aws 14
botocore.validate 13
botocore.utils 8
c7n.filters.multiattr 2
c7n.resources.securityhub 32
c7n.utils 39
c7n.resources.route53 42
c7n.resources.s3control 5
c7n.resources.ml 3
c7n.resources.sar 7
c7n.resources.ec2 2
c7n.resources.ebs 1
c7n.resources.s3 20
c7n.resources.account 40
c7n.resources.awslambda 35
c7n.resources.batch 10
c7n.element 5
c7n.resources.iam 49
c7n.actions.policy 6
c7n.resources.code 1
c7n.resources.cloudfront 4
c7n.resolver 51
botocore.paginate 58
c7n.vendored.distutils.version 3
c7n.filters.related 2
c7n.resources.airflow 5
c7n.resources.appflow 1
c7n.resources.sfn 8
c7n.resources.vpc 2
botocore.config 13
c7n.resources.emr 6
c7n.resources.secretsmanager 6
c7n.resources.mq 2
c7n.resources.shield 14
c7n.filters.iamaccess 5
c7n.resources.ami 9
c7n.resources.elasticsearch 9

Fuzzer: fuzz_actions_process

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 579 77.6%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 167 22.3%
All colors 746 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
222 134 c7n.utils.local_session call site: 00134 c7n.actions.notify.BaseNotify.expand_variables
95 608 botocore.session.ComponentLocator.get_component call site: 00608 botocore.credentials.create_credential_resolver
51 410 c7n.utils.get_retry call site: 00410 botocore.session.get_session
32 91 ...fuzz_actions_process.TestOneInput call site: 00091 c7n.actions.webhook.Webhook._process_call
31 357 ...fuzz_actions_process.TestOneInput call site: 00357 c7n.actions.autoscaling.AutoscalingBase.process_restore_scaling_options_from_tag
20 389 ...fuzz_actions_process.TestOneInput call site: 00389 c7n.credentials.assumed_session
11 35 c7n.cache.factory call site: 00035 c7n.cache.SqlKvCache.__init__
11 596 botocore.session.ComponentLocator.get_component call site: 00596 botocore.session.Session.get_config_variable
11 718 botocore.session.Session.set_config_variable call site: 00718 c7n.utils.local_session
10 573 botocore.session.Session.__init__ call site: 00573 botocore.session.Session.get_config_variable
10 735 ...fuzz_actions_process.TestOneInput call site: 00735 c7n.actions.autotag.AutoTagUser.get_tag_value
6 48 c7n.manager.ResourceManager.__init__ call site: 00048 c7n.filters.core.FilterRegistry.factory

Runtime coverage analysis

Covered functions
2137
Functions that are reachable but not covered
363
Reachable functions
463
Percentage of reachable functions covered
21.6%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_actions_process 29
c7n.actions.core 7
c7n.filters.core 11
c7n.manager 4
c7n.cache 9
c7n.registry 1
c7n.filters.waf 1
c7n.actions.notify 34
c7n.actions.webhook 20
c7n.utils 33
c7n.resolver 51
botocore.paginate 54
botocore.utils 26
c7n.actions.autoscaling 22
c7n.actions.invoke 11
botocore.config 13
c7n.credentials 12
botocore.credentials 42
c7n.resources.s3 20
c7n.resources.ebs 1
botocore.session 67
botocore.hooks 25
botocore.compat 1
botocore.configprovider 20
botocore.useragent 8
botocore.monitoring 2
botocore.httpsession 15
botocore.tokens 5
c7n.actions.metric 4
c7n.actions.autotag 9

Fuzzer: fuzz_actions_parser

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 35 53.0%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 31 46.9%
All colors 66 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
11 33 c7n.cache.factory call site: 00033 c7n.cache.SqlKvCache.__init__
6 46 c7n.manager.ResourceManager.__init__ call site: 00046 c7n.filters.core.FilterRegistry.factory
5 0 EP call site: 00000 ...fuzz_actions_parser.FuzzOption.__init__
5 59 c7n.manager.ResourceManager.__init__ call site: 00059 c7n.actions.core.ActionRegistry.factory
3 53 c7n.filters.core.BaseValueFilter.__init__ call site: 00053 c7n.registry.PluginRegistry.get
1 6 ...fuzz_actions_parser.FuzzOption.__init__ call site: 00006 ...fuzz_actions_parser._generate_random_dict
1 14 ...fuzz_actions_parser.TestOneInput call site: 00014 fdp.PickValueInList
1 27 c7n.filters.core.FilterRegistry.__init__ call site: 00027 ...fuzz_actions_parser.FuzzContext.__init__
1 30 ...fuzz_actions_parser.FuzzContext.__init__ call site: 00030 c7n.manager.ResourceManager.__init__
1 57 c7n.registry.PluginRegistry.get call site: 00057 results.append

Runtime coverage analysis

Covered functions
2136
Functions that are reachable but not covered
23
Reachable functions
40
Percentage of reachable functions covered
42.5%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_actions_parser 15
c7n.actions.core 7
c7n.filters.core 11
c7n.manager 4
c7n.cache 9
c7n.registry 1

Fuzzer: fuzz_gcp_resources_process

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 338 83.0%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 69 16.9%
All colors 407 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
241 114 ...fuzz_gcp_resources_process.TestOneInput call site: 00114 c7n.filters.core.ValueFilter.match
26 379 ...fuzz_gcp_resources_process.TestOneInput call site: 00379 c7n_gcp.resources.resourcemanager.AccessApprovalFilter.process
16 97 ...fuzz_gcp_resources_process.TestOneInput call site: 00097 c7n_gcp.resources.resourcemanager.HierarchyAction.load_hierarchy
11 35 c7n.cache.factory call site: 00035 c7n.cache.SqlKvCache.__init__
10 368 ...fuzz_gcp_resources_process.TestOneInput call site: 00368 c7n_gcp.resources.compute.EffectiveFirewall.process_resource
7 360 ...fuzz_gcp_resources_process.TestOneInput call site: 00360 c7n.utils.local_session
6 48 c7n.manager.ResourceManager.__init__ call site: 00048 c7n.filters.core.FilterRegistry.factory
5 61 c7n.manager.ResourceManager.__init__ call site: 00061 c7n.actions.core.ActionRegistry.factory
5 91 c7n.utils.local_session call site: 00091 session.client
3 9 ...fuzz_gcp_resources_process.TestOneInput call site: 00009 .dict
3 55 c7n.filters.core.BaseValueFilter.__init__ call site: 00055 c7n.registry.PluginRegistry.get
1 0 EP call site: 00000 atheris.FuzzedDataProvider

Runtime coverage analysis

Covered functions
2137
Functions that are reachable but not covered
175
Reachable functions
213
Percentage of reachable functions covered
17.84%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_gcp_resources_process 24
c7n.actions.core 7
c7n.filters.core 29
c7n.manager 4
c7n.cache 9
c7n.registry 1
c7n_gcp.query 3
c7n_gcp.resources.kms 6
c7n.utils 27
c7n_gcp.resources.resourcemanager 13
c7n_gcp.actions.core 15
c7n.resolver 51
botocore.paginate 55
botocore.utils 4
c7n.vendored.distutils.version 3
c7n_gcp.resources.gke 7
c7n_gcp.resources.compute 10
c7n_gcp.resources.sql 7

Fuzzer: fuzz_resources_validate

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 115 43.2%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 151 56.7%
All colors 266 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
22 178 ...fuzz_resources_validate.TestOneInput call site: 00178 c7n.utils.parse_date
16 107 botocore.validate.ParamValidator._check_special_validation_cases call site: 00107 botocore.validate.ParamValidator._validate_document
11 0 EP call site: 00000 c7n.manager.ResourceManager.__init__
11 13 c7n.cache.factory call site: 00013 c7n.cache.SqlKvCache.__init__
6 26 c7n.manager.ResourceManager.__init__ call site: 00026 c7n.filters.core.FilterRegistry.factory
5 37 c7n.registry.PluginRegistry.get call site: 00037 results.append
4 67 ...fuzz_resources_validate.TestOneInput call site: 00067 c7n.actions.core.Action.__init__
3 33 c7n.filters.core.BaseValueFilter.__init__ call site: 00033 c7n.registry.PluginRegistry.get
3 161 ...fuzz_resources_validate.TestOneInput call site: 00161 .dict
3 167 ...fuzz_resources_validate.TestOneInput call site: 00167 c7n.resources.aws.shape_validate
3 225 ...fuzz_resources_validate.TestOneInput call site: 00225 c7n.resources.aws.shape_validate
3 243 ...fuzz_resources_validate.TestOneInput call site: 00243 c7n.resources.aws.shape_validate

Runtime coverage analysis

Covered functions
2130
Functions that are reachable but not covered
71
Reachable functions
137
Percentage of reachable functions covered
48.18%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_resources_validate 67
c7n.manager 3
c7n.cache 9
c7n.filters.core 10
c7n.registry 1
c7n.resources.s3 1
c7n.resources.account 6
c7n.resources.aws 6
botocore.validate 13
botocore.utils 2
c7n.resources.vpc 8
c7n.resources.ec2 3
c7n.vendored.distutils.version 3
c7n.resources.health 2
c7n.resources.awslambda 1
c7n.resources.rdscluster 2
c7n.resources.securityhub 3
c7n.resources.asg 2
c7n.resources.route53 1
c7n.resources.ecr 1
c7n.resources.rds 4
c7n.resources.eks 3
c7n.resources.emr 2
c7n.resources.ami 6
c7n.utils 8
c7n.resources.cloudfront 1
c7n.resources.sagemaker 2
c7n.resources.ssm 1
c7n.resources.cloudtrail 2
c7n.resources.kafka 3
c7n.resources.servicecatalog 1
c7n.resources.redshift 3
c7n.resources.efs 1
c7n.resources.glue 1

Fuzz engine guidance

This sections provides heuristics that can be used as input to a fuzz engine when running a given fuzz target. The current focus is on providing input that is usable by libFuzzer.

/src/fuzz_filters_parser.py

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['...fuzz_filters_parser.TestOneInput', 'c7n.cache.factory', 'c7n.manager.ResourceManager.__init__', 'c7n.filters.core.BaseValueFilter.__init__', '...fuzz_filters_parser.FuzzOption.__init__', 'c7n.filters.core.FilterRegistry.__init__']

/src/fuzz_query_parser.py

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['c7n.utils.QueryParser.parse']

/src/fuzz_gcp_filters_validate_process.py

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['...fuzz_gcp_filters_validate_process.TestOneInput', 'c7n.utils.local_session', 'c7n.filters.core.ValueFilter.validate', 'c7n_gcp.filters.alerts.AlertsFilter.get_findings', '...fuzz_gcp_filters_validate_process.FuzzOption.__init__']

/src/fuzz_filters_validate.py

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['...fuzz_filters_validate.TestOneInput', 'c7n.cache.factory', 'c7n.manager.ResourceManager.__init__', 'c7n.filters.core.BaseValueFilter.__init__']

/src/fuzz_actions_validate.py

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['c7n.cache.factory', '...fuzz_actions_validate.TestOneInput', 'c7n.manager.ResourceManager.__init__', 'c7n.filters.core.FilterRegistry.__init__', 'c7n.utils.C7NJMESPathParser.parse', 'c7n.filters.core.BaseValueFilter.__init__']

/src/fuzz_gcp_actions_validate_process.py

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['c7n_gcp.actions.notify.Notify.process', '...fuzz_gcp_actions_validate_process.TestOneInput', 'c7n.cache.factory', 'c7n.manager.ResourceManager.__init__', 'c7n.filters.core.BaseValueFilter.__init__', 'c7n.registry.PluginRegistry.get']

/src/fuzz_filters_process.py

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['c7n.utils.local_session', '...fuzz_filters_process.TestOneInput', 'c7n.vendored.distutils.version.LooseVersion.parse', 'c7n.filters.core.ValueFilter.validate', 'c7n.cache.factory', 'c7n.manager.ResourceManager.__init__']

/src/fuzz_resources_parser.py

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['c7n.resources.sagemaker.QueryFilter.parse', 'c7n.resources.ec2.QueryFilter.parse', 'c7n.resources.health.QueryFilter.parse', 'c7n.resources.aws.Arn.parse', 'c7n.resources.emr.QueryFilter.parse']

/src/fuzz_resources_process.py

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['c7n.utils.get_retry', 'c7n.vendored.distutils.version.LooseVersion.parse', '...fuzz_resources_process.TestOneInput', 'c7n.resources.s3control.AccessPointCrossAccount.process', 'c7n.filters.core.ValueFilter.validate', 'botocore.validate.ParamValidator._check_special_validation_cases']

/src/fuzz_actions_process.py

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['c7n.utils.local_session', 'botocore.session.ComponentLocator.get_component', 'c7n.utils.get_retry', '...fuzz_actions_process.TestOneInput', 'c7n.cache.factory', 'botocore.session.Session.set_config_variable', 'botocore.session.Session.__init__']

/src/fuzz_actions_parser.py

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['c7n.cache.factory', 'c7n.manager.ResourceManager.__init__', 'c7n.filters.core.BaseValueFilter.__init__', '...fuzz_actions_parser.FuzzOption.__init__', '...fuzz_actions_parser.TestOneInput', 'c7n.filters.core.FilterRegistry.__init__', '...fuzz_actions_parser.FuzzContext.__init__', 'c7n.registry.PluginRegistry.get']

/src/fuzz_gcp_resources_process.py

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['...fuzz_gcp_resources_process.TestOneInput', 'c7n.cache.factory', 'c7n.manager.ResourceManager.__init__', 'c7n.utils.local_session']

/src/fuzz_resources_validate.py

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['...fuzz_resources_validate.TestOneInput', 'botocore.validate.ParamValidator._check_special_validation_cases', 'c7n.cache.factory', 'c7n.manager.ResourceManager.__init__', 'c7n.registry.PluginRegistry.get', 'c7n.filters.core.BaseValueFilter.__init__']

Runtime coverage analysis

This section shows analysis of runtime coverage data.

For futher technical details on how this section is generated, please see the Glossary .

Complex functions with low coverage

Func name Function total lines Lines covered at runtime percentage covered Reached by fuzzers
c7n.filters.core.ValueFilter.match 38 0 0.0% ['fuzz_gcp_filters_validate_process', 'fuzz_filters_process', 'fuzz_resources_process', 'fuzz_gcp_resources_process']
c7n.filters.core.ValueFilter.process_value_type 65 6 9.230% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.policy.PullMode.run 35 4 11.42% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.resources.ec2.SsmCompliance.process 33 5 15.15% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.resources.ec2.HasSpecificManagedPolicy.process 32 13 40.62% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.utils.get_eni_resource_type 56 2 3.571% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.resources.ami.SetPermissions.process_image 48 5 10.41% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
sources.add 1640 2 0.121% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_actions_process', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.filters.vpc.NetworkLocation.process_resource 38 0 0.0% ['fuzz_filters_process']
results.get 318 132 41.50% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
response.content 95 15 15.78% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
params.append 56 8 14.28% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
utils.CLIENT_NAME_TO_HYPHENIZED_SERVICE_ID_OVERRIDES.get 74 13 17.56% ['fuzz_filters_parser']
waiter.wait 42 11 26.19% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
source.get 199 34 17.08% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_actions_process', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.tags.TagActionFilter.__call__ 32 4 12.5% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.query.ChildResourceQuery.filter 32 0 0.0% []
c7n.resources.iam.ServiceUsage.process 40 10 25.0% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
yaml.dump 47 22 46.80% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
p.dump 53 9 16.98% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.resources.s3.ConfigS3.handle_BucketLifecycleConfiguration 37 0 0.0% []
c7n.resources.s3.ConfigS3.handle_BucketWebsiteConfiguration 36 15 41.66% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.resources.s3.assemble_bucket 43 0 0.0% []
c7n.resources.s3.EncryptExtantKeys.process_key 31 0 0.0% ['fuzz_actions_process', 'fuzz_resources_process']
c7n.resources.s3.SetInventory.process_bucket 33 0 0.0% []
c7n.resources.ebs.SetPermissions.process_image 31 15 48.38% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.resources.ebs.ModifyableVolume.process 44 5 11.36% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
model.refresh 216 61 28.24% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
botocore.vendored.six.print_.write 44 4 9.090% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
jmespath.functions.Functions.__init__ 228 87 38.15% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
botocore.credentials.EnvProvider._create_credentials_fetcher.fetch_credentials 33 6 18.18% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
botocore.session.Session.create_client 41 0 0.0% []
collections.deque.append 234 114 48.71% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
botocore.regions.EndpointRulesetResolver.auth_schemes_to_signing_ctx 33 0 0.0% []
botocore.regions.EndpointRulesetResolver.ruleset_error_to_botocore_exception 31 0 0.0% []
botocore.utils.S3RegionRedirectorv2.redirect_from_error 39 0 0.0% []
botocore.utils.S3RegionRedirector.redirect_from_error 33 0 0.0% []
rm.get_deprecations 100 12 12.0% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process']
botocore.paginate.PageIterator.__iter__ 43 0 0.0% ['fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process']
botocore.compat._windows_shell_split 37 0 0.0% []
it.next 49 11 22.44% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
http.request 687 147 21.39% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser']
name.rsplit 167 72 43.11% ['fuzz_actions_parser', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate']
c7n.resources.ecr.LifecycleRule.process 32 5 15.62% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
emitter.register 839 69 8.224% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
urllib3.util.ssl_.create_urllib3_context 181 53 29.28% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
retry.get_retry_policy_if_conditions_met 175 66 37.71% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
events.append 62 29 46.77% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
botocore.args.ClientArgsCreator.compute_client_args 40 0 0.0% []
botocore.docs.method.document_model_driven_method 52 0 0.0% []
botocore.docs.params.RequestParamsDocumenter._add_member_documentation 34 0 0.0% []
botocore.validate.ValidationErrors._format_error 34 0 0.0% []
fields.items 93 20 21.50% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.resources.securityhub.PostFinding.get_finding 50 0 0.0% ['fuzz_resources_process']
o.rsplit 38 16 42.10% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
futures.append 282 110 39.00% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
boto3.s3.transfer.S3Transfer.upload_file 117 39 33.33% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.provider.import_resource_classes 33 1 3.030% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.schema.specific_error 34 0 0.0% []
c7n.schema.process_resource 45 0 0.0% []
c7n.schema.resource_vocabulary 37 2 5.405% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.filters.metrics.MetricsFilter.process_resource_set 44 6 13.63% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
action.lower 60 16 26.66% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
actions.lower 51 22 43.13% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
uri.startswith 42 11 26.19% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
dateutil.tz.tz.gettz 813 312 38.37% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser']
pool.FindMessageTypeByName 347 178 51.29% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
extensions.get 1182 531 44.92% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
factory.pool.FindMessageTypeByName 154 31 20.12% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
delta.remove 243 36 14.81% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
typing_extensions.ParamSpec 1654 442 26.72% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
cachetools.LRUCache 516 133 25.77% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
connection.get_api_base_url_for_mtls 63 18 28.57% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
google.oauth2.challenges.SecurityKeyChallenge.obtain_challenge_input 50 0 0.0% []
google.oauth2.challenges.SecurityKeyChallenge._obtain_challenge_input_webauthn 31 0 0.0% []
api.Authenticate 214 16 7.476% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
download.consume_next_chunk 255 86 33.72% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
upload.transmit_next_chunk 271 88 32.47% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
port.split 153 47 30.71% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
urllib3.response.MultiDecoder 658 278 42.24% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
google_auth_httplib2.AuthorizedHttp 92 45 48.91% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.resources.ssm.PostItem.update_items 32 0 0.0% []
c7n.resources.account.CloudTrailEnabled.process 98 6 6.122% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.resources.account.ServiceLimit.process_check 44 9 20.45% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.resources.account.EnableTrail.process 56 5 8.928% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.resources.account.EnableDataEvents.process 40 4 10.0% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.resources.account.GlueCatalogEncryptionEnabled.get_target 32 11 34.37% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.resources.account.SesConsecutiveStats.process 36 6 16.66% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
base.pop 32 9 28.12% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.resources.elasticache.DeleteElastiCacheCluster.process 33 0 0.0% []
tasks.append 130 32 24.61% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
methods.append 55 19 34.54% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
be.get 49 18 36.73% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.resources.asg.ConfigValidFilter.get_asg_errors 47 4 8.510% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.resources.asg.Resize.process 43 8 18.60% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.resources.awslambda.VersionTrim.process_lambda 33 5 15.15% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.resources.vpc.ConfigSG.load_resource 35 15 42.85% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.resources.vpc.SGPermission.__call__ 39 16 41.02% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']
c7n.resources.vpc.MissingRoute.process 41 20 48.78% ['fuzz_actions_validate', 'fuzz_actions_parser', 'fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_query_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_resources_parser', 'fuzz_gcp_resources_process']

Files and Directories in report

This section shows which files and directories are considered in this report. The main reason for showing this is fuzz introspector may include more code in the reasoning than is desired. This section helps identify if too many files/directories are included, e.g. third party code, which may be irrelevant for the threat model. In the event too much is included, fuzz introspector supports a configuration file that can exclude data from the report. See the following link for more information on how to create a config file: link

Files in report

Source file Reached by Covered by
[] []
c7n.resources.cfn [] []
c7n.resources.swf [] []
google.api.monitoring_pb2 [] []
google.cloud._http [] []
botocore.paginate ['fuzz_gcp_filters_validate_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_process', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_gcp_resources_process'] []
urllib3 [] []
google.protobuf.internal.wire_format [] []
c7n_gcp.resources.resource_map [] []
google.api.context_pb2 [] []
google.api_core.version [] []
google.cloud.logging_v2.services [] []
html [] []
google.auth.transport.mtls [] []
c7n.resources.workspaces [] []
google.api_core._rest_streaming_base [] []
c7n_gcp.resources.secret [] []
google.cloud.storage.version [] []
c7n.resources.config [] []
google.cloud.monitoring_v3.services.query_service.transports.base [] []
botocore.errorfactory [] []
google.cloud.audit.audit_log_pb2 [] []
c7n.actions.autoscaling ['fuzz_actions_process'] []
c7n.resources.route53 ['fuzz_resources_process', 'fuzz_resources_validate'] []
c7n.resources.appstream [] []
contextlib [] []
c7n.filters.config [] []
google.cloud.storage.notification [] []
c7n_gcp.filters.recommender ['fuzz_gcp_filters_validate_process'] []
google.type.fraction_pb2 [] []
...fuzz_gcp_filters_validate_process ['fuzz_gcp_filters_validate_process'] []
logging [] []
google.protobuf.unknown_fields [] []
botocore.retries [] []
c7n.filters.waf ['fuzz_gcp_filters_validate_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_process', 'fuzz_resources_process', 'fuzz_actions_process'] []
google.rpc.status_pb2 [] []
google.api_core.page_iterator_async [] []
c7n_gcp.resources.cloudbilling [] []
google.api.auth_pb2 [] []
google.cloud.logging_v2.resource [] []
google.api.launch_stage_pb2 [] []
google.cloud.monitoring_v3.services.notification_channel_service.transports.grpc [] []
google.cloud.logging_v2.services.metrics_service_v2.transports.grpc_asyncio [] []
botocore.retryhandler [] []
google.api_core.operations_v1.pagers_base [] []
c7n.resources.comprehend [] []
c7n.filters.kms ['fuzz_filters_process'] []
google.type.expr_pb2 [] []
google.oauth2._reauth_async [] []
packaging [] []
google.protobuf.internal.enum_type_wrapper [] []
c7n.resources.bedrock [] []
queue [] []
google.cloud.monitoring_v3.services.group_service [] []
c7n.resources.backup [] []
botocore.docs.bcdoc [] []
google.cloud.logging_v2.services.metrics_service_v2.transports [] []
google.auth.external_account_authorized_user [] []
google.cloud.storage.constants [] []
google.api.field_behavior_pb2 [] []
json [] []
botocore.serialize [] []
hashlib [] []
google.api_core.client_options [] []
c7n_gcp.resources.bigquery [] []
google.api.metric_pb2 [] []
google.api_core.operations_v1.pagers_async [] []
dataclasses [] []
c7n_gcp.resources.armor [] []
flask [] []
google.protobuf.text_encoding [] []
google.cloud.monitoring_v3.services.alert_policy_service.pagers [] []
sys [] []
google.protobuf.api_pb2 [] []
google.oauth2._client_async [] []
google.type.interval_pb2 [] []
c7n_gcp.actions.iampolicy [] []
google.cloud.appengine_logging_v1.gapic_version [] []
botocore.history [] []
c7n_gcp.resources.kms ['fuzz_gcp_resources_process'] []
google.type.month_pb2 [] []
asyncio [] []
setproctitle [] []
google.rpc.code_pb2 [] []
google.cloud.logging_v2.handlers._helpers [] []
google.protobuf.symbol_database [] []
google.protobuf.text_format [] []
botocore.awsrequest [] []
enum [] []
c7n.filters.multiattr ['fuzz_gcp_filters_validate_process', 'fuzz_filters_validate', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_process', 'fuzz_resources_process'] []
google.oauth2.challenges [] []
c7n.resources.athena [] []
google.cloud.monitoring_v3.types.mutation_record [] []
google.cloud.logging_v2.services.config_service_v2 [] []
io [] []
botocore.discovery [] []
c7n_gcp.resources.mlengine [] []
google.api_core.operations_v1.operations_client_config [] []
csv [] []
google.auth.crypt [] []
botocore.retries.bucket [] []
c7n_gcp.filters.alerts ['fuzz_gcp_filters_validate_process'] []
google.api_core.timeout [] []
c7n.resources.appsync [] []
atexit [] []
c7n.vendored.distutils.util [] []
sqlite3 [] []
google.auth.downscoped [] []
botocore.docs.waiter [] []
subprocess [] []
google.auth.crypt._helpers [] []
struct [] []
google.cloud.logging_v2.services.metrics_service_v2.transports.grpc [] []
botocore [] []
google.protobuf [] []
google.cloud.monitoring.gapic_version [] []
googleapiclient [] []
google.api.annotations_pb2 [] []
c7n.resources.networkmanager [] []
c7n.resources.sns [] []
google._async_resumable_media.requests._request_helpers [] []
google.api_core.rest_streaming [] []
google.cloud.logging_v2.services.config_service_v2.transports [] []
c7n.testing [] []
c7n_gcp.resources.loadbalancer [] []
inspect [] []
google.iam.v1.iam_policy_pb2_grpc [] []
google.type.calendar_period_pb2 [] []
botocore.retries.quota [] []
urllib [] []
google.cloud.logging_v2.services.config_service_v2.transports.grpc [] []
c7n_gcp.filters.sccfindings ['fuzz_gcp_filters_validate_process'] []
gzip [] []
google.cloud.monitoring_v3.services.snooze_service [] []
google.protobuf.pyext.cpp_message [] []
c7n.cli [] []
c7n.resolver ['fuzz_gcp_filters_validate_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_process', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_gcp_resources_process'] []
botocore.eventstream [] []
google.cloud.monitoring_v3.types.group [] []
google.protobuf.descriptor [] []
google.auth._helpers [] []
google.api_core.grpc_helpers [] []
c7n.resources.cloudfront ['fuzz_resources_process', 'fuzz_resources_validate'] []
botocore.docs.paginator [] []
c7n.resources.kinesis [] []
fnmatch [] []
botocore.endpoint_provider [] []
google.cloud.appengine_logging_v1.services [] []
c7n.registry ['fuzz_filters_parser', 'fuzz_gcp_filters_validate_process', 'fuzz_filters_validate', 'fuzz_actions_validate', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_process', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_actions_parser', 'fuzz_gcp_resources_process', 'fuzz_resources_validate'] []
c7n.resources ['fuzz_filters_validate', 'fuzz_filters_process'] []
google.cloud.monitoring [] []
google.api_core.protobuf_helpers [] []
botocore.config ['fuzz_resources_process', 'fuzz_actions_process'] []
c7n.ufuncs.s3crypt [] []
c7n.resources.quicksight [] []
c7n.resources.batch ['fuzz_resources_process'] []
calendar [] []
google.cloud.monitoring_v3.types.alert_service [] []
google.longrunning.operations_proto_pb2 [] []
google.api_core.gapic_v1.routing_header [] []
google.protobuf.testdata [] []
google.auth.exceptions [] []
c7n.actions.notify ['fuzz_actions_validate', 'fuzz_gcp_actions_validate_process', 'fuzz_actions_process'] []
c7n.resources.sqs [] []
c7n.resources.acm [] []
c7n_gcp.filters.timerange ['fuzz_gcp_filters_validate_process'] []
botocore.vendored.requests.packages.urllib3 [] []
botocore.retries.special [] []
c7n_gcp.client [] []
google.api.visibility_pb2 [] []
botocore.auth [] []
c7n [] []
aws_xray_sdk [] []
c7n_azure [] []
OpenSSL [] []
google.auth.transport._mtls_helper [] []
c7n.resources.aws ['fuzz_resources_parser', 'fuzz_resources_process', 'fuzz_resources_validate'] []
c7n.executor [] []
dateutil [] []
google.cloud.monitoring_v3.services.query_service.async_client [] []
zipfile [] []
c7n_gcp.resources.artifactregistry [] []
copyreg [] []
google.cloud.logging_v2.handlers [] []
google.protobuf.internal [] []
c7n.resources.apigw [] []
google.cloud.logging_v2.handlers.app_engine [] []
c7n.resources.ami ['fuzz_resources_process', 'fuzz_resources_validate'] []
google.gapic.metadata.gapic_metadata_pb2 [] []
...fuzz_actions_validate ['fuzz_actions_validate'] []
c7n.filters.policystatement ['fuzz_filters_process'] []
c7n_gcp.resources.source [] []
c7n.resources.lex [] []
google.oauth2.webauthn_handler_factory [] []
c7n_gcp.resources [] []
ipaddress [] []
c7n.resources.directory [] []
google.api.billing_pb2 [] []
google._async_resumable_media [] []
...fuzz_filters_parser ['fuzz_filters_parser'] []
c7n.resources.support [] []
c7n.resources.pmtcrypt [] []
c7n.filters.iamaccess ['fuzz_filters_process', 'fuzz_resources_process'] []
google.api.usage_pb2 [] []
google.cloud.monitoring_v3.services.group_service.transports.grpc [] []
...fuzz_actions_process ['fuzz_actions_process'] []
google.cloud.monitoring_v3.services.query_service.transports.grpc [] []
google.logging.type.http_request_pb2 [] []
google.api_core.operations_v1.transports.rest_asyncio [] []
google.cloud.logging_v2.handlers.transports.base [] []
c7n.schema [] []
c7n.resources.rds ['fuzz_resources_validate'] []
atheris [] []
google.cloud.logging_v2 [] []
google.api_core.operation_async [] []
weakref [] []
google.type.dayofweek_pb2 [] []
c7n.resources.transfer [] []
google.api.log_pb2 [] []
google.cloud.monitoring_v3.services.uptime_check_service.transports.base [] []
google.iam.v1.resource_policy_member_pb2 [] []
botocore.retries.throttling [] []
google.cloud.monitoring_v3._dataframe [] []
time [] []
pathlib [] []
google.api_core.retry.retry_unary [] []
c7n.resources.ecs [] []
c7n.resources.snowball [] []
c7n_gcp.resources.function [] []
google.protobuf.compiler.plugin_pb2 [] []
google.cloud.monitoring_v3.types.metric [] []
google.api_core.operations_v1.transports [] []
c7n.resources.sar ['fuzz_resources_process'] []
google.cloud.logging_v2.services.logging_service_v2.transports.grpc_asyncio [] []
c7n.resources.pinpoint [] []
google.cloud.exceptions [] []
google.api_core.retry.retry_streaming [] []
google.cloud.monitoring_v3.types.alert [] []
c7n.resources.inspector2 [] []
c7n_gcp.resources.build [] []
google.cloud.monitoring_v3.types.notification [] []
google.auth.metrics [] []
google.auth.transport.grpc [] []
backports [] []
google.api.monitored_resource_pb2 [] []
botocore.retries.adaptive [] []
c7n.ctx ['fuzz_filters_validate', 'fuzz_filters_process'] []
google.api.http_pb2 [] []
jsonpatch [] []
c7n.actions.policy ['fuzz_resources_process'] []
decimal [] []
c7n_gcp.resources.storage [] []
c7n_gcp.actions [] []
c7n_gcp.filters.metrics ['fuzz_gcp_filters_validate_process'] []
c7n_gcp.filters.labels ['fuzz_gcp_filters_validate_process'] []
pyasn1 [] []
c7n_gcp.resources.spanner [] []
google.auth.jwt [] []
botocore.tokens ['fuzz_actions_process'] []
google.resumable_media.requests._request_helpers [] []
google.cloud.storage._signing [] []
google.cloud.logging_v2.services.metrics_service_v2.transports.base [] []
c7n_gcp.entry [] []
google [] []
c7n.resources.asg ['fuzz_resources_validate'] []
functools [] []
google.cloud.monitoring_v3.services.notification_channel_service.async_client [] []
botocore.docs.example [] []
google.rpc.context.attribute_context_pb2 [] []
google.protobuf.wrappers_pb2 [] []
c7n.resources.rdsparamgroup [] []
google._async_resumable_media.requests [] []
c7n.tags [] []
certifi [] []
math [] []
c7n.resources.fsx [] []
google.cloud.monitoring_v3.types.notification_service [] []
google.auth.transport [] []
botocore.vendored [] []
c7n.resources.emr ['fuzz_resources_parser', 'fuzz_resources_process', 'fuzz_resources_validate'] []
google.cloud.monitoring_v3.services.uptime_check_service.async_client [] []
google.cloud.monitoring_v3.services.snooze_service.async_client [] []
...fuzz_filters_process ['fuzz_filters_process'] []
google.api_core.operations_v1.abstract_operations_base_client [] []
google.cloud.monitoring_v3.types.snooze_service [] []
os [] []
botocore.httpsession ['fuzz_actions_process'] []
grpc [] []
c7n_gcp.resources.dataflow [] []
c7n.resources.ses [] []
google.rpc.http_pb2 [] []
botocore.response [] []
google.cloud.monitoring_v3.services.snooze_service.transports [] []
datetime [] []
google.api_core.operations_v1.operations_async_client [] []
google.cloud.monitoring_v3.services.group_service.async_client [] []
google.cloud.monitoring_v3.services.query_service.transports.grpc_asyncio [] []
c7n_gcp.actions.cscc ['fuzz_gcp_actions_validate_process'] []
google.api_core.operations_v1.operations_client [] []
c7n.log [] []
botocore.credentials ['fuzz_actions_process'] []
c7n.varfmt [] []
botocore.translate [] []
c7n.resources.appelb [] []
c7n.resources.opensearch [] []
google.cloud.logging_v2.handlers.transports [] []
google.api.client_pb2 [] []
mimetypes [] []
google.cloud.logging_v2.handlers._monitored_resources [] []
c7n.actions.webhook ['fuzz_actions_process'] []
google.auth.credentials [] []
c7n.structure ['fuzz_filters_validate', 'fuzz_filters_process'] []
botocore.monitoring ['fuzz_actions_process'] []
google.protobuf.field_mask_pb2 [] []
botocore.exceptions [] []
operator [] []
c7n.resources.lakeformation [] []
sphinx [] []
google.cloud.monitoring_v3.services.notification_channel_service.client [] []
google.auth._service_account_info [] []
google.api_core.gapic_v1.method [] []
c7n.filters.costhub [] []
re [] []
google.protobuf.json_format [] []
c7n.actions.autotag ['fuzz_actions_process'] []
google.auth.aio.transport [] []
google.auth._default_async [] []
google.cloud.logging.handlers.middleware [] []
google.resumable_media._helpers [] []
c7n.data [] []
google.cloud.storage.batch [] []
c7n.resources.servicediscovery [] []
botocore.compat ['fuzz_actions_process'] []
google.cloud.logging_v2.services.logging_service_v2.pagers [] []
google.cloud.monitoring_v3.services.group_service.transports [] []
jwt [] []
google.cloud.monitoring_v3.services.metric_service.transports.grpc_asyncio [] []
google.api_core.operations_v1.pagers [] []
google.api.backend_pb2 [] []
google.type.phone_number_pb2 [] []
google.protobuf.descriptor_pb2 [] []
google.api.documentation_pb2 [] []
google.cloud.logging_v2.services.config_service_v2.async_client [] []
c7n_gcp.resources.network [] []
google.auth.identity_pool [] []
google.protobuf.duration_pb2 [] []
base64 [] []
google.type.decimal_pb2 [] []
google.protobuf.timestamp_pb2 [] []
google.protobuf.duration [] []
crcmod [] []
google.protobuf.internal.well_known_types [] []
c7n.handler [] []
...fuzz_resources_validate ['fuzz_resources_validate'] []
typing [] []
google.oauth2.reauth [] []
pickle [] []
tabulate [] []
google.cloud.logging_v2.handlers.middleware [] []
c7n.loader ['fuzz_filters_validate', 'fuzz_filters_process'] []
google.cloud.monitoring_v3.services.alert_policy_service.transports [] []
google.cloud.monitoring_v3.services.query_service.pagers [] []
google.cloud.monitoring_v3.services.uptime_check_service.transports [] []
cryptography [] []
c7n.resources.ssm ['fuzz_resources_validate'] []
botocore.crt.auth [] []
c7n.resources.glue ['fuzz_resources_validate'] []
c7n.resources.vpc ['fuzz_resources_process', 'fuzz_resources_validate'] []
google.cloud.monitoring_v3.services.query_service [] []
google.cloud._testing [] []
google.cloud.logging_v2.services.metrics_service_v2.client [] []
posixpath [] []
c7n.filters.iamanalyzer ['fuzz_filters_process'] []
c7n_gcp.resources.datafusion [] []
google.longrunning.operations_grpc_pb2 [] []
c7n.sqsexec [] []
c7n.actions.core ['fuzz_filters_parser', 'fuzz_gcp_filters_validate_process', 'fuzz_filters_validate', 'fuzz_actions_validate', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_process', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_actions_parser', 'fuzz_gcp_resources_process'] []
google.api.distribution_pb2 [] []
opentelemetry [] []
google.cloud.appengine_logging [] []
hmac [] []
google.cloud.storage.bucket [] []
unittest [] []
google.auth.iam [] []
c7n.resources.datapipeline [] []
google.auth._jwt_async [] []
binascii [] []
c7n.resources.redshift ['fuzz_resources_validate'] []
botocore.vendored.requests.packages [] []
c7n.resources.efs ['fuzz_resources_validate'] []
google.cloud.logging_v2.types.logging_config [] []
warnings [] []
c7n.version [] []
google.auth [] []
c7n_gcp.policy [] []
c7n.resources.airflow ['fuzz_resources_process'] []
botocore.docs.client [] []
google.api_core.retry.retry_unary_async [] []
botocore.docs.params [] []
google.cloud.monitoring_v3.services.service_monitoring_service.transports.grpc [] []
botocore.configloader [] []
google.protobuf.internal.type_checkers [] []
c7n_gcp.resources.notebook [] []
...fuzz_filters_validate ['fuzz_filters_validate'] []
google.auth.pluggable [] []
c7n.resources.sfn ['fuzz_resources_process'] []
c7n.resources.connect [] []
itertools [] []
google.cloud.logging_v2.handlers.middleware.request [] []
c7n_kube [] []
google.cloud.storage [] []
pyasn1_modules [] []
google.api_core.path_template [] []
c7n_gcp.resources.compute ['fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process'] []
c7n.resources.elasticache [] []
google.protobuf.type_pb2 [] []
google.api_core.client_logging [] []
google.iam.v1.policy_pb2_grpc [] []
google.auth.impersonated_credentials [] []
google.cloud.logging_v2.handlers.structured_log [] []
c7n_gcp.resources.appengine [] []
google.api_core.exceptions [] []
c7n_gcp.resources.resourcemanager ['fuzz_gcp_resources_process'] []
google.oauth2.credentials [] []
google.type.datetime_pb2 [] []
c7n_gcp.resources.cloudrun ['fuzz_gcp_filters_validate_process'] []
google.cloud.monitoring_v3.services.uptime_check_service.client [] []
google.protobuf.any [] []
google.cloud.monitoring_v3.services.service_monitoring_service.client [] []
google.cloud.monitoring_v3.types.dropped_labels [] []
c7n.resources.firewall [] []
...fuzz_gcp_resources_process ['fuzz_gcp_resources_process'] []
botocore.retries.standard [] []
c7n.resources.lightsail [] []
google.api_core.future.base [] []
c7n.resources.health ['fuzz_resources_parser', 'fuzz_resources_validate'] []
google.cloud.logging_v2.handlers.transports.sync [] []
c7n.resources.account ['fuzz_resources_process', 'fuzz_resources_validate'] []
c7n.resources.directconnect [] []
google.cloud.logging [] []
google.resumable_media.common [] []
c7n.resources.shield ['fuzz_resources_process'] []
c7n_gcp.resources.logging [] []
google.cloud.version [] []
argparse [] []
google.oauth2._credentials_async [] []
pandas [] []
shutil [] []
botocore.configprovider ['fuzz_actions_process'] []
cachetools [] []
c7n.resources.gamelift [] []
google.oauth2._service_account_async [] []
google.longrunning.operations_grpc [] []
c7n.vendored.distutils.version ['fuzz_gcp_filters_validate_process', 'fuzz_filters_process', 'fuzz_resources_process', 'fuzz_gcp_resources_process', 'fuzz_resources_validate'] []
google.protobuf.proto_json [] []
google.iam.v1.logging.audit_data_pb2 [] []
c7n.filters.vpc ['fuzz_filters_validate', 'fuzz_filters_process'] []
google.cloud.monitoring_v3.services.notification_channel_service [] []
google.oauth2._id_token_async [] []
google.cloud.monitoring_v3.services.uptime_check_service [] []
google.cloud.logging_v2.types.logging_metrics [] []
c7n.resources.dynamodb [] []
google.cloud.logging_v2.handlers.transports.background_thread [] []
google.resumable_media.requests [] []
c7n_gcp.resources.dns [] []
google.cloud.monitoring_v3.services.snooze_service.client [] []
botocore.plugin [] []
google.protobuf.internal.encoder [] []
google.type.color_pb2 [] []
botocore.vendored.six [] []
google.cloud.logging_v2.services.logging_service_v2.transports.base [] []
google.auth.crypt._python_rsa [] []
botocore.compress [] []
google.protobuf.pyext [] []
google.api.config_change_pb2 [] []
google.cloud.storage.acl [] []
google._async_resumable_media._download [] []
c7n_gcp.resources.gke ['fuzz_gcp_resources_process'] []
botocore.endpoint [] []
c7n.resources.glacier [] []
c7n.commands [] []
google.api.control_pb2 [] []
google.cloud.monitoring_v3.services.service_monitoring_service.transports.grpc_asyncio [] []
google.auth.api_key [] []
google.cloud.client [] []
google.cloud.logging_v2._gapic [] []
google.auth.transport.urllib3 [] []
google.cloud.logging_v2.services.logging_service_v2.transports [] []
google.type.latlng_pb2 [] []
google.cloud.logging_v2.services.config_service_v2.client [] []
c7n.filters.missing ['fuzz_filters_validate', 'fuzz_filters_process'] []
google.api_core.gapic_v1.config_async [] []
google.cloud.monitoring_v3.services.metric_service.client [] []
google.cloud.logging_v2.services.config_service_v2.pagers [] []
zlib [] []
c7n_gcp [] []
google.auth.compute_engine._metadata [] []
google.cloud.monitoring_v3.services.alert_policy_service.transports.base [] []
c7n_gcp.handler [] []
google.api_core.rest_helpers [] []
google.oauth2.utils [] []
c7n_gcp.actions.labels ['fuzz_gcp_actions_validate_process'] []
c7n.resources.s3control ['fuzz_resources_process'] []
google.type.timeofday_pb2 [] []
google.api.endpoint_pb2 [] []
httplib2 [] []
c7n.resources.servicecatalog ['fuzz_resources_validate'] []
google.cloud.appengine_logging_v1.types.request_log [] []
c7n_gcp.region [] []
google.cloud.logging.gapic_version [] []
c7n.resources.eks ['fuzz_resources_validate'] []
c7n.resources.elb [] []
c7n.resources.timestream [] []
google.cloud.monitoring_v3.types.metric_service [] []
botocore.docs.bcdoc.restdoc [] []
google.api_core.extended_operation [] []
google.api_core.gapic_v1.method_async [] []
google.cloud.monitoring_v3.services.alert_policy_service.client [] []
botocore.retries.base [] []
google.auth.aio._helpers [] []
botocore.hooks ['fuzz_actions_process'] []
google.protobuf.internal.builder [] []
google._async_resumable_media.requests.download [] []
google.cloud.monitoring_v3.services.group_service.client [] []
google.api_core.general_helpers [] []
importlib [] []
botocore.docs.translator [] []
yaml [] []
c7n.ufuncs [] []
google.cloud.operation [] []
rsa [] []
google.cloud.logging_v2.services.metrics_service_v2.pagers [] []
xml [] []
google.auth._cloud_sdk [] []
google.cloud.appengine_logging_v1 [] []
google.api_core.operations_v1.operations_rest_client_async [] []
google.logging.type.log_severity_pb2 [] []
c7n.filters.revisions ['fuzz_filters_validate', 'fuzz_filters_process'] []
google.auth.environment_vars [] []
google.cloud.monitoring_v3.services.uptime_check_service.transports.grpc [] []
c7n_gcp.resources.sql ['fuzz_gcp_actions_validate_process', 'fuzz_gcp_resources_process'] []
botocore.docs.docstring [] []
uuid [] []
google.cloud.monitoring_v3.services.metric_service.async_client [] []
c7n.credentials ['fuzz_actions_process'] []
c7n.element ['fuzz_resources_process'] []
botocore.docs.bcdoc.style [] []
c7n.actions.metric ['fuzz_actions_process'] []
botocore.regions [] []
c7n.resources.s3 ['fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate'] []
google.cloud.monitoring_v3.types.snooze [] []
google.api_core.version_header [] []
c7n.resources.ecr ['fuzz_resources_validate'] []
c7n.resources.globalaccelerator [] []
google.api.service_pb2 [] []
google.resumable_media.requests.upload [] []
c7n.resources.kendra [] []
c7n.resources.ram [] []
google.auth.aws [] []
google._async_resumable_media._upload [] []
google.oauth2.service_account [] []
google.cloud.monitoring_v3.services.query_service.client [] []
google.auth.transport._requests_base [] []
google.protobuf.empty_pb2 [] []
google.api_core.operations_v1.abstract_operations_client [] []
google.longrunning.operations_proto [] []
google.iam.v1.options_pb2 [] []
google.cloud.monitoring_v3.types.query_service [] []
google.cloud.location.locations_pb2 [] []
google.api_core.future._helpers [] []
google.iam.v1.logging [] []
c7n_gcp.mu [] []
c7n.resources.dms [] []
retrying [] []
google.auth._refresh_worker [] []
google.cloud._helpers [] []
c7n_gcp.resources.memstore [] []
google.cloud.monitoring_v3.services.metric_service.transports.base [] []
configparser [] []
google.api_core.retry_async [] []
google.cloud.monitoring_v3.services.notification_channel_service.pagers [] []
google.resumable_media._download [] []
google.api.resource_pb2 [] []
google._async_resumable_media.requests.upload [] []
google_crc32c [] []
psutil [] []
google.api_core.future [] []
tempfile [] []
google.cloud.storage.fileio [] []
google.auth.crypt.base [] []
c7n.resources.appmesh [] []
c7n.resources.org [] []
google.auth.crypt.es256 [] []
c7n.resources.fis [] []
google.cloud.monitoring_v3.types.uptime [] []
google.api_core.operations_v1.transports.base [] []
google.cloud.logging_v2.types.logging [] []
google.api_core.operations_v1.transports.rest [] []
c7n.resources.cw [] []
botocore.docs.method [] []
threading [] []
c7n.resources.resource_map [] []
c7n.filters.metrics ['fuzz_filters_validate'] []
c7n.cwe [] []
google.protobuf.service_reflection [] []
google.cloud.logging_v2.logger [] []
google.cloud.logging_v2.services.metrics_service_v2.async_client [] []
c7n_gcp.resources.service [] []
google.cloud.monitoring_v3.services.alert_policy_service [] []
google.api_core.gapic_v1.config [] []
c7n.resources.artifact [] []
google.cloud.storage.iam [] []
c7n.resources.iam ['fuzz_resources_process'] []
google.api_core [] []
c7n.resources.elasticbeanstalk [] []
google.iam.v1 [] []
google.cloud.logging_v2.services.logging_service_v2 [] []
botocore.useragent ['fuzz_actions_process'] []
c7n.reports [] []
c7n.resources.budgets [] []
botocore.docs.utils [] []
google.api.system_parameter_pb2 [] []
google.cloud.monitoring_v3.types.uptime_service [] []
c7n_left [] []
botocore.docs [] []
google.cloud.monitoring_v3.services.notification_channel_service.transports.base [] []
google.cloud.logging.handlers.transports [] []
botocore.utils ['fuzz_gcp_filters_validate_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_process', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_gcp_resources_process', 'fuzz_resources_validate'] []
google_auth_httplib2 [] []
c7n.resources.cognito [] []
c7n.provider ['fuzz_filters_validate', 'fuzz_filters_process'] []
c7n_gcp.resources.osconfig [] []
google.cloud.monitoring_v3.services.group_service.pagers [] []
c7n_tencentcloud [] []
google.oauth2.sts [] []
google.cloud.monitoring_v3.services.notification_channel_service.transports [] []
c7n.filters.backup ['fuzz_filters_process'] []
c7n_oci [] []
botocore.docs.bcdoc.docstringparser [] []
google.api_core.datetime_helpers [] []
c7n.query ['fuzz_resources_process'] []
google.oauth2.webauthn_handler [] []
google.api.field_info_pb2 [] []
ctypes [] []
google.cloud.environment_vars [] []
google.auth._credentials_base [] []
c7n_gcp.resources.iam [] []
c7n.resources.mq ['fuzz_resources_process'] []
google.protobuf.descriptor_pool [] []
google.auth.version [] []
google.auth.transport._http_client [] []
collections [] []
botocore.handlers [] []
c7n.resources.accessanalyzer [] []
google.protobuf.proto [] []
google.cloud.storage.hmac_key [] []
google.auth.aio.transport.sessions [] []
google.api_core.gapic_v1 [] []
c7n.resources.waf [] []
google.api_core.retry.retry_streaming_async [] []
google.cloud.monitoring_v3.services.metric_service [] []
google.cloud.monitoring_v3.services.metric_service.pagers [] []
c7n_gcp.resources.bigtable [] []
botocore.loaders [] []
c7n.resources.ec2 ['fuzz_resources_parser', 'fuzz_resources_process', 'fuzz_resources_validate'] []
grpc_status [] []
c7n.resources.storagegw [] []
c7n.output ['fuzz_filters_validate', 'fuzz_filters_process'] []
google.cloud.logging_v2.client [] []
botocore.crt [] []
requests [] []
c7n.resources.kms [] []
botocore.docs.shape [] []
c7n.policy ['fuzz_filters_validate', 'fuzz_filters_process'] []
c7n.resources.xray [] []
google.cloud.monitoring_v3.services.group_service.transports.grpc_asyncio [] []
c7n_gcp.actions.notify ['fuzz_gcp_actions_validate_process'] []
botocore.vendored.requests.exceptions [] []
google.cloud.storage.client [] []
google.protobuf.util [] []
google.protobuf.source_context_pb2 [] []
google.cloud.logging_v2.metric [] []
google.cloud.monitoring_v3.services.alert_policy_service.transports.grpc [] []
grpc_gcp [] []
google.api_core.future.async_future [] []
c7n.resources.memorydb [] []
google.cloud.logging_v2._http [] []
google._async_resumable_media._helpers [] []
google.auth.transport._custom_tls_signer [] []
google.cloud.logging_v2.handlers.handlers [] []
argcomplete [] []
c7n.resources.cloudsearch [] []
google.cloud.monitoring_v3 [] []
google.auth._exponential_backoff [] []
google.api.policy_pb2 [] []
c7n.resources.elasticsearch ['fuzz_resources_process'] []
[] []
google.cloud.storage.retry [] []
c7n.filters.related ['fuzz_filters_process', 'fuzz_resources_process'] []
google.protobuf.proto_builder [] []
google.longrunning.operations_pb2 [] []
google.cloud.audit [] []
google.cloud.logging_v2.entries [] []
google.protobuf.internal.api_implementation [] []
google.api_core.gapic_v1.client_info [] []
boto3 [] []
email [] []
google.cloud.monitoring_v3.services.alert_policy_service.transports.grpc_asyncio [] []
google.api.routing_pb2 [] []
random [] []
google.cloud.monitoring_v3.services.metric_service.transports [] []
c7n.filters [] []
google.protobuf.internal.testing_refleaks [] []
google.auth.transport._aiohttp_requests [] []
...fuzz_resources_process ['fuzz_resources_process'] []
textwrap [] []
google.cloud.appengine_logging.gapic_version [] []
google.protobuf.internal.field_mask [] []
c7n.cache ['fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_actions_validate', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_process', 'fuzz_actions_process', 'fuzz_actions_parser', 'fuzz_gcp_resources_process', 'fuzz_resources_validate'] []
botocore.docs.sharedexample [] []
botocore.vendored.requests [] []
shlex [] []
google.cloud.monitoring_v3.services.snooze_service.transports.grpc [] []
c7n_openstack [] []
c7n.vendored.distutils [] []
c7n_gcp.provider [] []
c7n_gcp.resources.deploymentmanager [] []
google.cloud.logging_v2.services.logging_service_v2.async_client [] []
copy [] []
google.cloud.monitoring_v3.services [] []
c7n.actions.invoke ['fuzz_actions_process'] []
c7n_gcp.filters.iampolicy ['fuzz_gcp_filters_validate_process'] []
google.api_core.retry.retry_base [] []
google.oauth2.id_token [] []
botocore.vendored.requests.packages.urllib3.exceptions [] []
google.api_core.operation [] []
google.cloud.monitoring_v3.services.group_service.transports.base [] []
google.api.label_pb2 [] []
c7n.utils ['fuzz_query_parser', 'fuzz_gcp_filters_validate_process', 'fuzz_filters_validate', 'fuzz_actions_validate', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_process', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_gcp_resources_process', 'fuzz_resources_validate'] []
google.resumable_media.requests.download [] []
google.cloud.logging_v2.sink [] []
google.protobuf.compiler [] []
google.cloud.logging.handlers [] []
google.protobuf.any_pb2 [] []
botocore.validate ['fuzz_resources_process', 'fuzz_resources_validate'] []
socket [] []
google.api_core.bidi [] []
google.auth.aio.transport.aiohttp [] []
...fuzz_query_parser ['fuzz_query_parser'] []
http [] []
google.api_core.rest_streaming_async [] []
botocore.args [] []
google.cloud.monitoring_v3.services.service_monitoring_service [] []
...fuzz_gcp_actions_validate_process ['fuzz_gcp_actions_validate_process'] []
c7n.resources.appflow ['fuzz_resources_process'] []
google.api_core.operations_v1 [] []
google.auth._default [] []
c7n.filters.offhours ['fuzz_filters_parser', 'fuzz_gcp_filters_validate_process', 'fuzz_filters_validate', 'fuzz_filters_process'] []
c7n.actions.network ['fuzz_actions_validate'] []
google.api_core.retry [] []
pdb [] []
google.cloud.monitoring_v3.types.service_service [] []
c7n.resources.qldb [] []
google.cloud.monitoring_v3.services.alert_policy_service.async_client [] []
platform [] []
google.cloud.monitoring_v3.services.notification_channel_service.transports.grpc_asyncio [] []
importlib_metadata [] []
botocore.context [] []
google.cloud.monitoring_v3.services.service_monitoring_service.transports.base [] []
google.cloud.storage._helpers [] []
google.cloud.obsolete [] []
string [] []
xform_name [] []
google.cloud.monitoring_v3.types.group_service [] []
c7n_gcp.utils [] []
c7n.resources.cloudtrail ['fuzz_resources_process', 'fuzz_resources_validate'] []
proto [] []
traceback [] []
google.cloud.monitoring_v3.gapic_version [] []
google.cloud.monitoring_v3.services.metric_service.transports.grpc [] []
google.cloud.monitoring_v3.services.service_monitoring_service.pagers [] []
typing_extensions [] []
c7n.deprecated [] []
c7n_awscc [] []
google.auth._oauth2client [] []
aiohttp [] []
c7n.resources.keyspaces [] []
google.rpc.error_details_pb2 [] []
pyrate_limiter [] []
botocore.session ['fuzz_actions_process'] []
google.auth.external_account [] []
google.cloud.logging_v2._instrumentation [] []
c7n_gcp.filters [] []
c7n.resources.devicefarm [] []
google.resumable_media._upload [] []
c7n_gcp.resources.pubsub [] []
c7n.resources.simpledb [] []
google.cloud.monitoring_v3.types [] []
google.protobuf.runtime_version [] []
c7n.resources.iot [] []
google.cloud.storage._http [] []
google.api_core.iam [] []
c7n.reports.csvout [] []
google.cloud.audit.bigquery_audit_metadata_pb2 [] []
c7n.resources.rdscluster ['fuzz_resources_validate'] []
google.resumable_media [] []
google.type.localized_text_pb2 [] []
botocore.signers [] []
google.cloud.logging_v2.services.logging_service_v2.client [] []
c7n.resources.secretsmanager ['fuzz_resources_process'] []
google.cloud.appengine_logging_v1.types [] []
google.auth.aio.credentials [] []
google.type.date_pb2 [] []
google.iam.v1.options_pb2_grpc [] []
c7n.resources.datasync [] []
google.cloud.logging_v2.services.metrics_service_v2 [] []
google.api.error_reason_pb2 [] []
c7n.resources.hsm [] []
google.rpc.context.audit_context_pb2 [] []
google.protobuf.reflection [] []
c7n.mu [] []
google.cloud.logging_v2.services.logging_service_v2.transports.grpc [] []
botocore.client [] []
google.api.quota_pb2 [] []
google.cloud.monitoring_v3.services.snooze_service.transports.grpc_asyncio [] []
botocore.model [] []
botocore.waiter [] []
google.cloud.logging_v2.types [] []
c7n.filters.core ['fuzz_filters_parser', 'fuzz_gcp_filters_validate_process', 'fuzz_filters_validate', 'fuzz_actions_validate', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_process', 'fuzz_resources_process', 'fuzz_actions_process', 'fuzz_actions_parser', 'fuzz_gcp_resources_process', 'fuzz_resources_validate'] []
google.type.postal_address_pb2 [] []
google.cloud.logging_v2.gapic_version [] []
c7n_gcp.output [] []
c7n.exceptions [] []
google.oauth2._client [] []
google.cloud.logging_v2.services.config_service_v2.transports.base [] []
c7n_gcp.query ['fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process'] []
c7n.resources.dlm [] []
google.api_core.universe [] []
c7n.resources.opsworks [] []
google.protobuf.internal.extension_dict [] []
google.auth.aio [] []
c7n.resources.quotas [] []
google.protobuf.descriptor_database [] []
c7n.resources.discovery [] []
google.protobuf.internal.decoder [] []
cffi [] []
google.api_core.page_iterator [] []
c7n.resources.sagemaker ['fuzz_resources_parser', 'fuzz_resources_validate'] []
c7n.resources.code ['fuzz_resources_process'] []
gc [] []
google.cloud.monitoring_v3.services.snooze_service.transports.base [] []
google.cloud.extended_operations_pb2 [] []
c7n.manager ['fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_actions_validate', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_process', 'fuzz_actions_process', 'fuzz_actions_parser', 'fuzz_gcp_resources_process', 'fuzz_resources_validate'] []
google.api_core.client_info [] []
jmespath [] []
google.cloud.monitoring_v3.services.uptime_check_service.pagers [] []
google.oauth2.webauthn_types [] []
google.protobuf.message [] []
google.cloud.monitoring_v3.types.service [] []
google.cloud.monitoring_v3.types.span_context [] []
google.protobuf.proto_text [] []
google.api.consumer_pb2 [] []
c7n.lookup [] []
c7n.resources.ebs ['fuzz_resources_process', 'fuzz_actions_process'] []
...fuzz_actions_parser ['fuzz_actions_parser'] []
google.auth._credentials_async [] []
c7n.config [] []
botocore.httpchecksum [] []
google.iam.v1.policy_pb2 [] []
google.auth.compute_engine.credentials [] []
google.cloud.logging_v2.handlers.container_engine [] []
google.protobuf.internal.message_listener [] []
google.protobuf.internal.python_message [] []
google._upb._message [] []
google.api.logging_pb2 [] []
c7n.resources.ml ['fuzz_resources_process'] []
c7n_gcp.actions.core ['fuzz_gcp_actions_validate_process', 'fuzz_gcp_resources_process'] []
google.cloud.monitoring_v3.services.service_monitoring_service.async_client [] []
c7n.resources.awslambda ['fuzz_resources_process', 'fuzz_resources_validate'] []
google.type.quaternion_pb2 [] []
google.cloud.monitoring_v3.query [] []
google.cloud.storage.transfer_manager [] []
c7n.filters.health ['fuzz_filters_process'] []
google.cloud.monitoring_v3.services.service_monitoring_service.transports [] []
botocore.stub [] []
google.cloud.logging_v2.types.log_entry [] []
c7n.resources.securityhub ['fuzz_resources_process', 'fuzz_resources_validate'] []
google.protobuf.internal.containers [] []
google.auth.transport.requests [] []
c7n_gcp.resources.dataproc [] []
google.type.money_pb2 [] []
google.oauth2.gdch_credentials [] []
types [] []
google.protobuf.message_factory [] []
jsonschema [] []
awscrt [] []
google.cloud.logging_v2._helpers [] []
c7n.resources.kafka ['fuzz_resources_validate'] []
google.cloud.monitoring_v3.types.common [] []
botocore.docs.service [] []
google.longrunning.operations_pb2_grpc [] []
google.protobuf.timestamp [] []
google.api.source_info_pb2 [] []
google.auth.crypt.rsa [] []
google.auth.app_engine [] []
google.cloud.monitoring_v3.services.query_service.transports [] []
google.api.httpbody_pb2 [] []
contextvars [] []
botocore.parsers [] []
c7n.actions [] []
getpass [] []
google.auth.crypt._cryptography_rsa [] []
google.iam.v1.iam_policy_pb2 [] []
google.protobuf.internal.python_edition_defaults [] []
google.api_core.future.polling [] []
google.cloud.monitoring_v3.services.snooze_service.pagers [] []
...fuzz_resources_parser ['fuzz_resources_parser'] []
google.auth.compute_engine [] []
google.cloud.storage._opentelemetry_tracing [] []
concurrent [] []
google.api_core.grpc_helpers_async [] []
google.cloud.monitoring_v3.services.uptime_check_service.transports.grpc_asyncio [] []
google.oauth2 [] []
google.cloud.storage.blob [] []
google.protobuf.struct_pb2 [] []
google.cloud.logging_v2.services.config_service_v2.transports.grpc_asyncio [] []
c7n.resources.guardduty [] []

Directories in report

Directory

Metadata section

This sections shows the raw data that is used to produce this report. This is mainly used for further processing and developer debugging.

Fuzzer Calltree file Program data file Coverage file
fuzz_filters_parser fuzzerLogFile-fuzz_filters_parser.data fuzzerLogFile-fuzz_filters_parser.data.yaml all_cov.json
fuzz_query_parser fuzzerLogFile-fuzz_query_parser.data fuzzerLogFile-fuzz_query_parser.data.yaml all_cov.json
fuzz_gcp_filters_validate_process fuzzerLogFile-fuzz_gcp_filters_validate_process.data fuzzerLogFile-fuzz_gcp_filters_validate_process.data.yaml all_cov.json
fuzz_filters_validate fuzzerLogFile-fuzz_filters_validate.data fuzzerLogFile-fuzz_filters_validate.data.yaml all_cov.json
fuzz_actions_validate fuzzerLogFile-fuzz_actions_validate.data fuzzerLogFile-fuzz_actions_validate.data.yaml all_cov.json
fuzz_gcp_actions_validate_process fuzzerLogFile-fuzz_gcp_actions_validate_process.data fuzzerLogFile-fuzz_gcp_actions_validate_process.data.yaml all_cov.json
fuzz_filters_process fuzzerLogFile-fuzz_filters_process.data fuzzerLogFile-fuzz_filters_process.data.yaml all_cov.json
fuzz_resources_parser fuzzerLogFile-fuzz_resources_parser.data fuzzerLogFile-fuzz_resources_parser.data.yaml all_cov.json
fuzz_resources_process fuzzerLogFile-fuzz_resources_process.data fuzzerLogFile-fuzz_resources_process.data.yaml all_cov.json
fuzz_actions_process fuzzerLogFile-fuzz_actions_process.data fuzzerLogFile-fuzz_actions_process.data.yaml all_cov.json
fuzz_actions_parser fuzzerLogFile-fuzz_actions_parser.data fuzzerLogFile-fuzz_actions_parser.data.yaml all_cov.json
fuzz_gcp_resources_process fuzzerLogFile-fuzz_gcp_resources_process.data fuzzerLogFile-fuzz_gcp_resources_process.data.yaml all_cov.json
fuzz_resources_validate fuzzerLogFile-fuzz_resources_validate.data fuzzerLogFile-fuzz_resources_validate.data.yaml all_cov.json