Fuzz introspector
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues
Report generation date: 2025-11-30

Project overview: cloud-custodian

High level conclusions

Reachability and coverage overview

Functions statically reachable by fuzzers
6.0%
584 / 10060
Cyclomatic complexity statically reachable by fuzzers
6.0%
2072 / 33633
Runtime code coverage of functions
13.0%
1333 / 10060

Warning: The number of runtime covered functions are larger than the number of reachable functions. This means that Fuzz Introspector found there are more functions covered at runtime than what is considered reachable based on the static analysis. This is a limitation in the analysis as anything covered at runtime is by definition reachable by the fuzzers.
This is likely due to a limitation in the static analysis. In this case, the count of functions covered at runtime is the true value, which means this is what should be considered "achieved" by the fuzzer.

Use the project functions table below to query all functions that were not covered at runtime.

Fuzzers overview

Fuzzer Fuzzer filename Functions Reached Functions unreached Fuzzer depth Files reached Basic blocks reached Cyclomatic complexity Details
fuzz_filters_process /src/fuzz_filters_process.py 332 16525 10 31 264 1093 fuzz_filters_process.py
fuzz_gcp_actions_validate_process /src/fuzz_gcp_actions_validate_process.py 176 16682 10 16 117 571 fuzz_gcp_actions_validate_process.py
fuzz_resources_parser /src/fuzz_resources_parser.py 17 16866 2 3 6 50 fuzz_resources_parser.py
fuzz_filters_parser /src/fuzz_filters_parser.py 65 16792 5 8 39 207 fuzz_filters_parser.py
fuzz_query_parser /src/fuzz_query_parser.py 35 16842 5 3 31 114 fuzz_query_parser.py
fuzz_actions_validate /src/fuzz_actions_validate.py 55 16803 5 10 32 174 fuzz_actions_validate.py
fuzz_resources_process /src/fuzz_resources_process.py 477 16383 10 46 392 1576 fuzz_resources_process.py
fuzz_filters_validate /src/fuzz_filters_validate.py 128 16730 8 21 93 416 fuzz_filters_validate.py
fuzz_gcp_filters_validate_process /src/fuzz_gcp_filters_validate_process.py 236 16622 11 23 154 761 fuzz_gcp_filters_validate_process.py
fuzz_actions_process /src/fuzz_actions_process.py 468 16389 15 31 331 1521 fuzz_actions_process.py
fuzz_actions_parser /src/fuzz_actions_parser.py 40 16817 5 7 20 125 fuzz_actions_parser.py
fuzz_gcp_resources_process /src/fuzz_gcp_resources_process.py 203 16654 10 19 146 662 fuzz_gcp_resources_process.py
fuzz_resources_validate /src/fuzz_resources_validate.py 129 16753 7 32 103 416 fuzz_resources_validate.py

Project functions overview

The following table shows data about each function in the project. The functions included in this table correspond to all functions that exist in the executables of the fuzzers. As such, there may be functions that are from third-party libraries.

For further technical details on the meaning of columns in the below table, please see the Glossary .

Func name Functions filename Args Function call depth Reached by Fuzzers Runtime reached by Fuzzers Combined reached by Fuzzers Fuzzers runtime hit Func lines hit % I Count BB Count Cyclomatic complexity Functions reached Reached by functions Accumulated cyclomatic complexity Undiscovered complexity

Fuzzer details

Fuzzer: fuzz_filters_process

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 569 83.3%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 114 16.6%
All colors 683 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
314 367 c7n.utils.local_session call site: 00367 c7n.filters.iamaccess.CrossAccountAccessFilter.process
114 70 ...fuzz_filters_process.TestOneInput call site: 00070 c7n.loader.PolicyLoader.load_data
79 282 ...fuzz_filters_process.TestOneInput call site: 00282 c7n.filters.vpc.SubnetFilter.process
12 217 ...fuzz_filters_process.TestOneInput call site: 00217 c7n.filters.offhours.OnHour.get_default_schedule
11 35 c7n.cache.factory call site: 00035 c7n.cache.SqlKvCache.__init__
6 48 c7n.manager.ResourceManager.__init__ call site: 00048 c7n.filters.core.FilterRegistry.factory
5 61 c7n.manager.ResourceManager.__init__ call site: 00061 c7n.actions.core.ActionRegistry.factory
5 186 ...fuzz_filters_process.TestOneInput call site: 00186 c7n.filters.offhours.Time.get_tz
4 3 ...fuzz_filters_process.TestOneInput call site: 00003 fdp.ConsumeUnicodeNoSurrogates
4 196 ...fuzz_filters_process.TestOneInput call site: 00196 dateutil.parser.parse
3 55 c7n.filters.core.BaseValueFilter.__init__ call site: 00055 c7n.registry.PluginRegistry.get
3 202 ...fuzz_filters_process.TestOneInput call site: 00202 .set

Runtime coverage analysis

Covered functions
1675
Functions that are reachable but not covered
295
Reachable functions
332
Percentage of reachable functions covered
11.14%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_filters_process 40
c7n.actions.core 7
c7n.filters.core 11
c7n.manager 4
c7n.cache 9
c7n.registry 1
c7n.filters.waf 1
c7n.filters.missing 4
c7n.loader 24
c7n.structure 13
c7n.resources 17
c7n.policy 10
c7n.ctx 2
c7n.output 5
c7n.utils 19
c7n.provider 4
c7n.filters.offhours 14
c7n.filters.vpc 22
c7n.filters.revisions 16
c7n.filters.multiattr 9
c7n.filters.policystatement 3
c7n.filters.kms 12
c7n.filters.related 14
c7n.filters.backup 15
c7n.filters.health 18
c7n.filters.iamaccess 15
c7n.resolver 51
botocore.paginate 55
botocore.utils 4
c7n.filters.iamanalyzer 13

Fuzzer: fuzz_gcp_actions_validate_process

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 229 72.4%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 87 27.5%
All colors 316 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
189 121 c7n_gcp.actions.notify.Notify.process call site: 00121 c7n.actions.notify.BaseNotify.expand_variables
11 35 c7n.cache.factory call site: 00035 c7n.cache.SqlKvCache.__init__
6 48 c7n.manager.ResourceManager.__init__ call site: 00048 c7n.filters.core.FilterRegistry.factory
6 111 c7n.utils.local_session call site: 00111 session.client
5 61 c7n.manager.ResourceManager.__init__ call site: 00061 c7n.actions.core.ActionRegistry.factory
3 55 c7n.filters.core.BaseValueFilter.__init__ call site: 00055 c7n.registry.PluginRegistry.get
2 71 ...fuzz_gcp_actions_validate_process.TestOneInput call site: 00071 dateutil.tz.gettz
2 103 ...fuzz_gcp_actions_validate_process.TestOneInput call site: 00103 c7n_gcp.actions.cscc.PostFinding.initialize_source
1 59 c7n.registry.PluginRegistry.get call site: 00059 results.append
1 74 ...fuzz_gcp_actions_validate_process.TestOneInput call site: 00074 .super
1 77 ...fuzz_gcp_actions_validate_process.TestOneInput call site: 00077 .super
1 81 c7n_gcp.actions.labels.LabelDelayedAction.__init__ call site: 00081 Time.TZ_ALIASES.get

Runtime coverage analysis

Covered functions
1677
Functions that are reachable but not covered
143
Reachable functions
176
Percentage of reachable functions covered
18.75%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_gcp_actions_validate_process 24
c7n.actions.core 7
c7n.filters.core 11
c7n.manager 4
c7n.cache 9
c7n.registry 1
c7n_gcp.actions.cscc 8
c7n_gcp.actions.labels 8
c7n.filters.waf 1
c7n.utils 15
c7n_gcp.actions.notify 7
c7n.actions.notify 4
c7n.resolver 51
botocore.paginate 55
botocore.utils 4

Fuzzer: fuzz_resources_parser

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 30 100.%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 0 0.0%
All colors 30 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
29 0 EP call site: 00000 c7n.resources.aws.Arn.parse

Runtime coverage analysis

Covered functions
1669
Functions that are reachable but not covered
16
Reachable functions
17
Percentage of reachable functions covered
5.88%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_resources_parser 8
c7n.resources.aws 8

Fuzzer: fuzz_filters_parser

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 75 65.2%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 40 34.7%
All colors 115 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
31 81 ...fuzz_filters_parser.TestOneInput call site: 00081 c7n.filters.offhours.ScheduleParser.parse_resource_schedule
12 68 ...fuzz_filters_parser.TestOneInput call site: 00068 c7n.filters.offhours.OnHour.get_default_schedule
11 33 c7n.cache.factory call site: 00033 c7n.cache.SqlKvCache.__init__
6 46 c7n.manager.ResourceManager.__init__ call site: 00046 c7n.filters.core.FilterRegistry.factory
5 59 c7n.manager.ResourceManager.__init__ call site: 00059 c7n.actions.core.ActionRegistry.factory
3 53 c7n.filters.core.BaseValueFilter.__init__ call site: 00053 c7n.registry.PluginRegistry.get
2 5 ...fuzz_filters_parser.FuzzOption.__init__ call site: 00005 ...fuzz_filters_parser._generate_random_dict
1 0 EP call site: 00000 atheris.FuzzedDataProvider
1 14 ...fuzz_filters_parser.TestOneInput call site: 00014 fdp.PickValueInList
1 27 c7n.filters.core.FilterRegistry.__init__ call site: 00027 ...fuzz_filters_parser.FuzzContext.__init__
1 30 ...fuzz_filters_parser.FuzzContext.__init__ call site: 00030 c7n.manager.ResourceManager.__init__
1 57 c7n.registry.PluginRegistry.get call site: 00057 results.append

Runtime coverage analysis

Covered functions
1675
Functions that are reachable but not covered
45
Reachable functions
65
Percentage of reachable functions covered
30.77%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_filters_parser 18
c7n.actions.core 7
c7n.filters.core 11
c7n.manager 4
c7n.cache 9
c7n.registry 1
c7n.filters.offhours 26

Fuzzer: fuzz_query_parser

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 58 93.5%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 4 6.45%
All colors 62 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
55 4 c7n.utils.QueryParser.parse call site: 00004 c7n.utils.QueryParser.parse_query
3 0 EP call site: 00000 c7n.utils.QueryParser.parse

Runtime coverage analysis

Covered functions
1669
Functions that are reachable but not covered
32
Reachable functions
35
Percentage of reachable functions covered
8.57%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_query_parser 5
c7n.utils 29

Fuzzer: fuzz_actions_validate

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 46 51.1%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 44 48.8%
All colors 90 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
11 34 c7n.cache.factory call site: 00034 c7n.cache.SqlKvCache.__init__
7 73 ...fuzz_actions_validate.TestOneInput call site: 00073 c7n.actions.network.ModifyVpcSecurityGroupsAction.get_action_group_names
6 47 c7n.manager.ResourceManager.__init__ call site: 00047 c7n.filters.core.FilterRegistry.factory
5 60 c7n.manager.ResourceManager.__init__ call site: 00060 c7n.actions.core.ActionRegistry.factory
4 28 c7n.filters.core.FilterRegistry.__init__ call site: 00028 c7n.manager.ResourceManager.__init__
4 84 c7n.utils.C7NJMESPathParser.parse call site: 00084 c7n.utils.jmespath_compile
3 54 c7n.filters.core.BaseValueFilter.__init__ call site: 00054 c7n.registry.PluginRegistry.get
2 69 ...fuzz_actions_validate.TestOneInput call site: 00069 .super
1 0 EP call site: 00000 atheris.FuzzedDataProvider
1 3 ...fuzz_actions_validate.TestOneInput call site: 00003 fdp.ConsumeUnicodeNoSurrogates
1 14 ...fuzz_actions_validate._generate_random_dict call site: 00014 ...fuzz_actions_validate._generate_random_dict
1 58 c7n.registry.PluginRegistry.get call site: 00058 results.append

Runtime coverage analysis

Covered functions
1677
Functions that are reachable but not covered
34
Reachable functions
55
Percentage of reachable functions covered
38.18%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_actions_validate 19
c7n.actions.core 7
c7n.filters.core 11
c7n.manager 4
c7n.cache 9
c7n.registry 1
c7n.actions.notify 2
c7n.actions.network 9
c7n.utils 4

Fuzzer: fuzz_resources_process

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 1007 89.3%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 120 10.6%
All colors 1127 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
480 254 c7n.utils.local_session call site: 00254 c7n.filters.core.ValueFilter.match
391 735 c7n.utils.get_retry call site: 00735 c7n.filters.core.ValueFilter.match
35 213 ...fuzz_resources_process.TestOneInput call site: 00213 c7n.resources.sar.CrossAccount.process
25 59 c7n.resources.aws.fake_session call site: 00059 botocore.validate.ParamValidator.validate
23 94 c7n.filters.core.ValueFilter.validate call site: 00094 c7n.utils.parse_date
11 132 ...fuzz_resources_process.TestOneInput call site: 00132 c7n.resources.cloudtrail.UpdateTrail.validate
7 8 ...fuzz_resources_process.TestOneInput call site: 00008 ...fuzz_resources_process._generate_random_dict
5 40 ...fuzz_resources_process.TestOneInput call site: 00040 c7n.query.QueryResourceManager.__init__
4 3 ...fuzz_resources_process.TestOneInput call site: 00003 fdp.ConsumeUnicodeNoSurrogates
3 32 ...fuzz_resources_process.TestOneInput call site: 00032 c7n.query.QueryResourceManager.get_source
3 55 ...fuzz_resources_process.TestOneInput call site: 00055 c7n.resources.aws.shape_validate
3 119 ...fuzz_resources_process.TestOneInput call site: 00119 .set

Runtime coverage analysis

Covered functions
1669
Functions that are reachable but not covered
431
Reachable functions
477
Percentage of reachable functions covered
9.64%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_resources_process 90
c7n.actions.core 2
c7n.filters.core 25
c7n.query 3
c7n.registry 1
c7n.resources.cloudtrail 20
c7n.resources.aws 14
botocore.validate 13
botocore.utils 8
c7n.resources.route53 42
c7n.filters.waf 1
c7n.utils 39
c7n.filters.multiattr 2
c7n.resources.securityhub 32
c7n.resources.sar 7
c7n.resources.ml 3
c7n.resources.ec2 2
c7n.resources.s3control 5
c7n.resources.elasticsearch 9
c7n.filters.policystatement 3
c7n.resources.batch 10
c7n.element 5
c7n.resources.code 1
c7n.resources.airflow 5
c7n.resources.account 40
c7n.resolver 51
botocore.paginate 58
c7n.vendored.distutils.version 3
c7n.resources.iam 49
c7n.filters.iamaccess 5
c7n.resources.emr 6
c7n.resources.awslambda 35
c7n.actions.policy 6
c7n.resources.ebs 1
c7n.resources.s3 20
c7n.filters.related 2
c7n.resources.ami 9
c7n.resources.vpc 2
botocore.config 13
c7n.resources.cloudfront 4
c7n.resources.appflow 1
c7n.resources.shield 14
c7n.resources.secretsmanager 6
c7n.resources.mq 2
c7n.resources.sfn 8

Fuzzer: fuzz_filters_validate

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 176 78.2%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 49 21.7%
All colors 225 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
114 108 ...fuzz_filters_validate.TestOneInput call site: 00108 c7n.loader.PolicyLoader.load_data
12 71 ...fuzz_filters_validate.TestOneInput call site: 00071 c7n.filters.offhours.OnHour.get_default_schedule
11 34 c7n.cache.factory call site: 00034 c7n.cache.SqlKvCache.__init__
6 47 c7n.manager.ResourceManager.__init__ call site: 00047 c7n.filters.core.FilterRegistry.factory
5 60 c7n.manager.ResourceManager.__init__ call site: 00060 c7n.actions.core.ActionRegistry.factory
5 90 ...fuzz_filters_validate.TestOneInput call site: 00090 c7n.filters.offhours.Time.get_tz
4 97 ...fuzz_filters_validate.TestOneInput call site: 00097 dateutil.parser.parse
3 54 c7n.filters.core.BaseValueFilter.__init__ call site: 00054 c7n.registry.PluginRegistry.get
3 104 ...fuzz_filters_validate.TestOneInput call site: 00104 .set
2 9 ...fuzz_filters_validate._generate_random_dict call site: 00009 fdp.ConsumeIntInRange
1 1 ...fuzz_filters_validate.TestOneInput call site: 00001 fdp.ConsumeIntInRange
1 4 ...fuzz_filters_validate.FuzzOption.__init__ call site: 00004 fdp.ConsumeUnicodeNoSurrogates

Runtime coverage analysis

Covered functions
1677
Functions that are reachable but not covered
102
Reachable functions
128
Percentage of reachable functions covered
20.31%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_filters_validate 27
c7n.actions.core 7
c7n.filters.core 11
c7n.manager 4
c7n.cache 9
c7n.registry 1
c7n.filters.missing 4
c7n.filters.metrics 1
c7n.filters.offhours 10
c7n.filters.revisions 3
c7n.filters.vpc 1
c7n.filters.multiattr 2
c7n.loader 24
c7n.structure 13
c7n.resources 17
c7n.policy 10
c7n.ctx 2
c7n.output 5
c7n.utils 3
c7n.provider 4

Fuzzer: fuzz_gcp_filters_validate_process

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 368 81.2%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 85 18.7%
All colors 453 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
253 116 ...fuzz_gcp_filters_validate_process.TestOneInput call site: 00116 c7n.filters.core.ValueFilter.match
27 370 ...fuzz_gcp_filters_validate_process.TestOneInput call site: 00370 c7n_gcp.filters.metrics.GCPMetricsFilter.get_batched_query_filter
26 423 ...fuzz_gcp_filters_validate_process.TestOneInput call site: 00423 c7n_gcp.filters.iampolicy.IamPolicyFilter.process_resources
21 401 ...fuzz_gcp_filters_validate_process.TestOneInput call site: 00401 c7n_gcp.filters.recommender.RecommenderFilter.match_resources
9 101 c7n_gcp.filters.alerts.AlertsFilter.get_findings call site: 00101 c7n_gcp.filters.alerts.AlertsFilter.process_resource
6 50 ...fuzz_gcp_filters_validate_process.TestOneInput call site: 00050 c7n.filters.offhours.Time.get_tz
5 61 ...fuzz_gcp_filters_validate_process.TestOneInput call site: 00061 c7n_gcp.filters.recommender.get_recommender_data
4 6 ...fuzz_gcp_filters_validate_process.FuzzOption.__init__ call site: 00006 ...fuzz_gcp_filters_validate_process._generate_random_dict
4 111 ...fuzz_gcp_filters_validate_process.TestOneInput call site: 00111 datetime.datetime.strptime
3 44 ...fuzz_gcp_filters_validate_process.TestOneInput call site: 00044 .set
2 41 c7n_gcp.filters.labels.LabelActionFilter.parse call site: 00041 remainder.endswith
2 398 ...fuzz_gcp_filters_validate_process.TestOneInput call site: 00398 c7n.filters.offhours.Time.get_tz

Runtime coverage analysis

Covered functions
1675
Functions that are reachable but not covered
201
Reachable functions
236
Percentage of reachable functions covered
14.83%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_gcp_filters_validate_process 31
c7n.actions.core 2
c7n.filters.core 22
c7n_gcp.query 3
c7n.registry 1
c7n_gcp.filters.labels 6
c7n.filters.multiattr 2
c7n_gcp.filters.metrics 23
c7n.filters.offhours 3
c7n.filters.waf 1
c7n_gcp.filters.recommender 23
c7n_gcp.filters.alerts 11
c7n.utils 25
c7n_gcp.filters.timerange 3
c7n_gcp.filters.sccfindings 16
c7n.resolver 51
botocore.paginate 54
botocore.utils 4
c7n.vendored.distutils.version 3
c7n_gcp.filters.iampolicy 16
c7n_gcp.resources.cloudrun 2
c7n_gcp.resources.compute 1

Fuzzer: fuzz_actions_process

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 592 77.9%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 167 22.0%
All colors 759 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
223 134 c7n.utils.local_session call site: 00134 c7n.actions.notify.BaseNotify.expand_variables
107 630 botocore.session.ComponentLocator.get_component call site: 00630 botocore.credentials.create_credential_resolver
51 427 c7n.utils.get_retry call site: 00427 botocore.session.get_session
32 91 ...fuzz_actions_process.TestOneInput call site: 00091 c7n.actions.webhook.Webhook._process_call
31 374 ...fuzz_actions_process.TestOneInput call site: 00374 c7n.actions.autoscaling.AutoscalingBase.process_restore_scaling_options_from_tag
20 406 ...fuzz_actions_process.TestOneInput call site: 00406 c7n.credentials.assumed_session
11 35 c7n.cache.factory call site: 00035 c7n.cache.SqlKvCache.__init__
11 604 botocore.session.ComponentLocator.get_component call site: 00604 botocore.session.Session.get_config_variable
11 747 botocore.session.Session.set_config_variable call site: 00747 c7n.utils.local_session
10 363 ...fuzz_actions_process.TestOneInput call site: 00363 c7n.actions.autotag.AutoTagUser.get_tag_value
10 590 botocore.session.Session.__init__ call site: 00590 botocore.session.Session.get_config_variable
6 48 c7n.manager.ResourceManager.__init__ call site: 00048 c7n.filters.core.FilterRegistry.factory

Runtime coverage analysis

Covered functions
1676
Functions that are reachable but not covered
368
Reachable functions
468
Percentage of reachable functions covered
21.37%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_actions_process 29
c7n.actions.core 7
c7n.filters.core 11
c7n.manager 4
c7n.cache 9
c7n.registry 1
c7n.filters.waf 1
c7n.actions.notify 34
c7n.actions.webhook 20
c7n.utils 33
c7n.resolver 51
botocore.paginate 55
botocore.utils 29
c7n.actions.metric 4
c7n.actions.autotag 9
c7n.actions.autoscaling 22
c7n.actions.invoke 11
botocore.config 13
c7n.credentials 12
botocore.credentials 47
c7n.resources.s3 20
c7n.resources.ebs 1
botocore.session 67
botocore.hooks 25
botocore.compat 1
botocore.configprovider 20
botocore.useragent 8
botocore.monitoring 2
botocore.httpsession 15
botocore.tokens 5

Fuzzer: fuzz_actions_parser

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 35 53.0%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 31 46.9%
All colors 66 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
11 33 c7n.cache.factory call site: 00033 c7n.cache.SqlKvCache.__init__
6 46 c7n.manager.ResourceManager.__init__ call site: 00046 c7n.filters.core.FilterRegistry.factory
5 0 EP call site: 00000 ...fuzz_actions_parser.FuzzOption.__init__
5 59 c7n.manager.ResourceManager.__init__ call site: 00059 c7n.actions.core.ActionRegistry.factory
3 53 c7n.filters.core.BaseValueFilter.__init__ call site: 00053 c7n.registry.PluginRegistry.get
1 6 ...fuzz_actions_parser.FuzzOption.__init__ call site: 00006 ...fuzz_actions_parser._generate_random_dict
1 14 ...fuzz_actions_parser.TestOneInput call site: 00014 fdp.PickValueInList
1 27 c7n.filters.core.FilterRegistry.__init__ call site: 00027 ...fuzz_actions_parser.FuzzContext.__init__
1 30 ...fuzz_actions_parser.FuzzContext.__init__ call site: 00030 c7n.manager.ResourceManager.__init__
1 57 c7n.registry.PluginRegistry.get call site: 00057 results.append

Runtime coverage analysis

Covered functions
1675
Functions that are reachable but not covered
23
Reachable functions
40
Percentage of reachable functions covered
42.5%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_actions_parser 15
c7n.actions.core 7
c7n.filters.core 11
c7n.manager 4
c7n.cache 9
c7n.registry 1

Fuzzer: fuzz_gcp_resources_process

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 325 83.1%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 66 16.8%
All colors 391 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
250 139 ...fuzz_gcp_resources_process.TestOneInput call site: 00139 c7n.filters.core.ValueFilter.match
21 97 ...fuzz_gcp_resources_process.TestOneInput call site: 00097 c7n_gcp.resources.sql.SqlInstanceDelete.process
11 35 c7n.cache.factory call site: 00035 c7n.cache.SqlKvCache.__init__
10 128 ...fuzz_gcp_resources_process.TestOneInput call site: 00128 c7n_gcp.resources.compute.EffectiveFirewall.process_resource
7 120 ...fuzz_gcp_resources_process.TestOneInput call site: 00120 c7n.utils.local_session
6 48 c7n.manager.ResourceManager.__init__ call site: 00048 c7n.filters.core.FilterRegistry.factory
5 61 c7n.manager.ResourceManager.__init__ call site: 00061 c7n.actions.core.ActionRegistry.factory
5 91 c7n.utils.local_session call site: 00091 session.client
3 9 ...fuzz_gcp_resources_process.TestOneInput call site: 00009 .dict
3 55 c7n.filters.core.BaseValueFilter.__init__ call site: 00055 c7n.registry.PluginRegistry.get
1 0 EP call site: 00000 atheris.FuzzedDataProvider
1 2 ...fuzz_gcp_resources_process.TestOneInput call site: 00002 ...fuzz_gcp_resources_process.FuzzOption.__init__

Runtime coverage analysis

Covered functions
1676
Functions that are reachable but not covered
167
Reachable functions
203
Percentage of reachable functions covered
17.73%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_gcp_resources_process 24
c7n.actions.core 7
c7n.filters.core 29
c7n.manager 4
c7n.cache 9
c7n.registry 1
c7n_gcp.query 3
c7n_gcp.resources.kms 6
c7n.utils 25
c7n_gcp.resources.sql 5
c7n_gcp.resources.resourcemanager 13
c7n_gcp.actions.core 4
c7n_gcp.resources.gke 7
c7n_gcp.resources.compute 10
c7n.resolver 51
botocore.paginate 54
botocore.utils 4
c7n.vendored.distutils.version 3

Fuzzer: fuzz_resources_validate

Call tree

The calltree shows the control flow of the fuzzer. This is overlaid with coverage information to display how much of the potential code a fuzzer can reach is in fact covered at runtime. In the following there is a link to a detailed calltree visualisation as well as a bitmap showing a high-level view of the calltree. For further information about these topics please see the glossary for full calltree and calltree overview

Call tree overview bitmap:

The distribution of callsites in terms of coloring is
Color Runtime hitcount Callsite count Percentage
red 0 143 59.0%
gold [1:9] 0 0.0%
yellow [10:29] 0 0.0%
greenyellow [30:49] 0 0.0%
lawngreen 50+ 99 40.9%
All colors 242 100

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
25 101 c7n.resources.aws.fake_session call site: 00101 botocore.validate.ParamValidator.validate
22 158 ...fuzz_resources_validate.TestOneInput call site: 00158 c7n.utils.parse_date
11 0 EP call site: 00000 c7n.manager.ResourceManager.__init__
11 13 c7n.cache.factory call site: 00013 c7n.cache.SqlKvCache.__init__
6 26 c7n.manager.ResourceManager.__init__ call site: 00026 c7n.filters.core.FilterRegistry.factory
5 227 ...fuzz_resources_validate.TestOneInput call site: 00227 c7n.vendored.distutils.version.LooseVersion.__init__
4 63 ...fuzz_resources_validate.TestOneInput call site: 00063 c7n.actions.core.Action.__init__
3 33 c7n.filters.core.BaseValueFilter.__init__ call site: 00033 c7n.registry.PluginRegistry.get
3 37 c7n.registry.PluginRegistry.get call site: 00037 results.append
3 136 ...fuzz_resources_validate.TestOneInput call site: 00136 .dict
3 147 ...fuzz_resources_validate.TestOneInput call site: 00147 c7n.resources.aws.shape_validate
3 182 ...fuzz_resources_validate.TestOneInput call site: 00182 c7n.resources.aws.shape_validate

Runtime coverage analysis

Covered functions
1669
Functions that are reachable but not covered
117
Reachable functions
129
Percentage of reachable functions covered
9.3%
NB: The sum of covered functions and functions that are reachable but not covered need not be equal to Reachable functions . This is because the reachability analysis is an approximation and thus at runtime some functions may be covered that are not included in the reachability analysis. This is a limitation of our static analysis capabilities.
Warning: The number of covered functions are larger than the number of reachable functions. This means that there are more functions covered at runtime than are extracted using static analysis. This is likely a result of the static analysis component failing to extract the right call graph or the coverage runtime being compiled with sanitizers in code that the static analysis has not analysed. This can happen if lto/gold is not used in all places that coverage instrumentation is used.
Function name source code lines source lines hit percentage hit

Files reached

filename functions hit
/ 1
...fuzz_resources_validate 59
c7n.manager 3
c7n.cache 9
c7n.filters.core 10
c7n.registry 1
c7n.resources.s3 1
c7n.resources.ami 6
c7n.resources.awslambda 1
c7n.resources.cloudfront 1
c7n.resources.account 6
c7n.resources.aws 6
botocore.validate 13
botocore.utils 2
c7n.resources.efs 1
c7n.resources.securityhub 3
c7n.resources.servicecatalog 1
c7n.resources.rds 4
c7n.resources.eks 3
c7n.resources.glue 1
c7n.resources.vpc 8
c7n.utils 8
c7n.resources.redshift 3
c7n.resources.ecr 1
c7n.resources.ssm 1
c7n.resources.kafka 3
c7n.resources.asg 2
c7n.resources.route53 1
c7n.resources.cloudtrail 2
c7n.resources.ec2 1
c7n.vendored.distutils.version 3
c7n.resources.rdscluster 2

Fuzz engine guidance

This sections provides heuristics that can be used as input to a fuzz engine when running a given fuzz target. The current focus is on providing input that is usable by libFuzzer.

/src/fuzz_filters_process.py

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['c7n.utils.local_session', '...fuzz_filters_process.TestOneInput', 'c7n.cache.factory', 'c7n.manager.ResourceManager.__init__']

/src/fuzz_gcp_actions_validate_process.py

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['c7n_gcp.actions.notify.Notify.process', 'c7n.cache.factory', 'c7n.manager.ResourceManager.__init__', 'c7n.utils.local_session', 'c7n.filters.core.BaseValueFilter.__init__', '...fuzz_gcp_actions_validate_process.TestOneInput', 'c7n.registry.PluginRegistry.get']

/src/fuzz_resources_parser.py

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


/src/fuzz_filters_parser.py

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['...fuzz_filters_parser.TestOneInput', 'c7n.cache.factory', 'c7n.manager.ResourceManager.__init__', 'c7n.filters.core.BaseValueFilter.__init__', '...fuzz_filters_parser.FuzzOption.__init__', 'c7n.filters.core.FilterRegistry.__init__']

/src/fuzz_query_parser.py

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['c7n.utils.QueryParser.parse']

/src/fuzz_actions_validate.py

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['c7n.cache.factory', '...fuzz_actions_validate.TestOneInput', 'c7n.manager.ResourceManager.__init__', 'c7n.filters.core.FilterRegistry.__init__', 'c7n.utils.C7NJMESPathParser.parse', 'c7n.filters.core.BaseValueFilter.__init__']

/src/fuzz_resources_process.py

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['c7n.utils.local_session', 'c7n.utils.get_retry', '...fuzz_resources_process.TestOneInput', 'c7n.resources.aws.fake_session', 'c7n.filters.core.ValueFilter.validate']

/src/fuzz_filters_validate.py

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['...fuzz_filters_validate.TestOneInput', 'c7n.cache.factory', 'c7n.manager.ResourceManager.__init__', 'c7n.filters.core.BaseValueFilter.__init__', '...fuzz_filters_validate._generate_random_dict']

/src/fuzz_gcp_filters_validate_process.py

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['...fuzz_gcp_filters_validate_process.TestOneInput', 'c7n_gcp.filters.alerts.AlertsFilter.get_findings', '...fuzz_gcp_filters_validate_process.FuzzOption.__init__']

/src/fuzz_actions_process.py

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['c7n.utils.local_session', 'botocore.session.ComponentLocator.get_component', 'c7n.utils.get_retry', '...fuzz_actions_process.TestOneInput', 'c7n.cache.factory', 'botocore.session.Session.set_config_variable']

/src/fuzz_actions_parser.py

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['c7n.cache.factory', 'c7n.manager.ResourceManager.__init__', 'c7n.filters.core.BaseValueFilter.__init__', '...fuzz_actions_parser.FuzzOption.__init__', '...fuzz_actions_parser.TestOneInput', 'c7n.filters.core.FilterRegistry.__init__', '...fuzz_actions_parser.FuzzContext.__init__', 'c7n.registry.PluginRegistry.get']

/src/fuzz_gcp_resources_process.py

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['...fuzz_gcp_resources_process.TestOneInput', 'c7n.cache.factory', 'c7n.manager.ResourceManager.__init__', 'c7n.utils.local_session', 'c7n.filters.core.BaseValueFilter.__init__']

/src/fuzz_resources_validate.py

Dictionary

Use this with the libFuzzer -dict=DICT.file flag


Fuzzer function priority

Use one of these functions as input to libfuzzer with flag: -focus_function name

-focus_function=['c7n.resources.aws.fake_session', '...fuzz_resources_validate.TestOneInput', 'c7n.cache.factory', 'c7n.manager.ResourceManager.__init__', 'c7n.filters.core.BaseValueFilter.__init__', 'c7n.registry.PluginRegistry.get']

Runtime coverage analysis

This section shows analysis of runtime coverage data.

For futher technical details on how this section is generated, please see the Glossary .

Complex functions with low coverage

Func name Function total lines Lines covered at runtime percentage covered Reached by fuzzers
c7n.filters.core.ValueFilter.match 38 0 0.0% ['fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_resources_process']
c7n.filters.core.ValueFilter.process_value_type 65 6 9.230% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
c7n.filters.vpc.NetworkLocation.process_resource 38 0 0.0% ['fuzz_filters_process']
c7n.policy.PullMode.run 35 4 11.42% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
c7n.utils.QueryParser.parse 33 2 6.060% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
c7n.utils.get_eni_resource_type 56 2 3.571% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
source.get 199 34 17.08% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
p.dump 53 9 16.98% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
actions.append 51 22 43.13% ['fuzz_filters_process']
action.process 60 16 26.66% ['fuzz_filters_process']
yaml.dump 47 22 46.80% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
response.content 95 15 15.78% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
i.rsplit 214 16 7.476% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
c7n.resources.s3.ConfigS3.handle_BucketLifecycleConfiguration 37 0 0.0% []
c7n.resources.s3.ConfigS3.handle_BucketWebsiteConfiguration 37 16 43.24% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
c7n.resources.s3.BucketAssembly.assemble 31 0 0.0% []
c7n.resources.s3.EncryptExtantKeys.process_key 31 0 0.0% ['fuzz_actions_process', 'fuzz_resources_process']
c7n.resources.s3.SetInventory.process_bucket 33 0 0.0% []
model.refresh 216 61 28.24% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
results.get 318 132 41.50% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
botocore.vendored.six.print_.write 44 4 9.090% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
jmespath.functions.Functions.__init__ 228 87 38.15% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
botocore.credentials.EnvProvider._create_credentials_fetcher.fetch_credentials 33 6 18.18% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
botocore.session.Session.create_client 43 0 0.0% []
collections.deque.append 234 114 48.71% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
botocore.utils.S3RegionRedirectorv2.redirect_from_error 39 0 0.0% []
botocore.utils.S3RegionRedirector.redirect_from_error 33 0 0.0% []
botocore.compat._windows_shell_split 37 0 0.0% []
name.rsplit 167 72 43.11% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_filters_process']
botocore.args.ClientArgsCreator.compute_client_args 40 0 0.0% []
botocore.httpsession.URLLib3Session.send 32 0 0.0% []
botocore.regions.EndpointRulesetResolver.auth_schemes_to_signing_ctx 33 0 0.0% []
botocore.regions.EndpointRulesetResolver.ruleset_error_to_botocore_exception 31 0 0.0% []
emitter.register 839 69 8.224% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
params.append 56 8 14.28% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
it.next 49 11 22.44% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
urllib3.util.ssl_.create_urllib3_context 181 53 29.28% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
retry.get_retry_policy_if_conditions_met 175 66 37.71% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
http.request 687 147 21.39% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
rm.get_deprecations 100 12 12.0% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process']
botocore.paginate.PageIterator.__iter__ 43 0 0.0% ['fuzz_gcp_actions_validate_process', 'fuzz_resources_process', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_filters_process']
utils.REGION_PARTITION_MAP.get 74 13 17.56% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
c7n.query.ChildResourceQuery.filter 32 0 0.0% []
events.append 62 29 46.77% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
botocore.docs.method.document_model_driven_method 52 0 0.0% []
botocore.docs.params.RequestParamsDocumenter._add_member_documentation 34 0 0.0% []
fields.items 93 20 21.50% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
botocore.validate.ValidationErrors._format_error 34 0 0.0% []
c7n.tags.TagActionFilter.__call__ 32 4 12.5% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
c7n.resources.elasticache.UpgradeAvailable.process 40 5 12.5% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
c7n.resources.elasticache.DeleteElastiCacheCluster.process 33 0 0.0% []
futures.append 282 110 39.00% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
boto3.s3.transfer.S3Transfer.upload_file 118 40 33.89% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
c7n.provider.import_resource_classes 33 1 3.030% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
c7n.schema.specific_error 34 0 0.0% []
c7n.schema.process_resource 45 0 0.0% []
c7n.schema.resource_vocabulary 37 2 5.405% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
c7n.filters.metrics.MetricsFilter.process_resource_set 44 6 13.63% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
uri.startswith 42 11 26.19% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
c7n.resources.securityhub.PostFinding.get_finding 50 0 0.0% ['fuzz_resources_process']
dateutil.tz.tz.gettz 813 312 38.37% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process']
c7n.resources.ec2.SsmCompliance.process 33 5 15.15% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
c7n.resources.ec2.HasSpecificManagedPolicy.process 32 13 40.62% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
waiter.wait 42 11 26.19% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
c7n.resources.iam.ServiceUsage.process 40 10 25.0% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
o.rsplit 40 17 42.5% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
delta.total_seconds 243 36 14.81% ['fuzz_gcp_actions_validate_process', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_resources_validate', 'fuzz_resources_process', 'fuzz_gcp_filters_validate_process', 'fuzz_actions_validate', 'fuzz_filters_process']
google_auth_httplib2.AuthorizedHttp 92 45 48.91% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
cachetools.LRUCache 501 131 26.14% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
rsa.key.PrivateKey.load_pkcs1 112 58 51.78% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
google.oauth2.challenges.SecurityKeyChallenge.obtain_challenge_input 50 0 0.0% []
google.oauth2.challenges.SecurityKeyChallenge._obtain_challenge_input_webauthn 31 0 0.0% []
connection.get_api_base_url_for_mtls 63 18 28.57% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
pool.FindMessageTypeByName 347 178 51.29% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process']
extensions.get 1182 531 44.92% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
factory.pool.FindMessageTypeByName 154 31 20.12% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
typing_extensions.ParamSpec 1654 441 26.66% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
download.consume_next_chunk 265 87 32.83% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
upload.transmit_next_chunk 271 88 32.47% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
transport.request 153 47 30.71% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
urllib3.response.MultiDecoder 658 278 42.24% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
be.get 49 18 36.73% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
c7n.resources.account.CloudTrailEnabled.process 98 6 6.122% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
c7n.resources.account.ServiceLimit.process_check 44 9 20.45% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
c7n.resources.account.EnableTrail.process 56 5 8.928% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
c7n.resources.account.EnableDataEvents.process 40 4 10.0% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
c7n.resources.account.GlueCatalogEncryptionEnabled.get_target 32 11 34.37% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
c7n.resources.account.SesConsecutiveStats.process 36 6 16.66% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
base.pop 32 9 28.12% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']
tasks.append 130 32 24.61% ['fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_parser', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_resources_process', 'fuzz_resources_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_actions_process', 'fuzz_actions_validate', 'fuzz_filters_process', 'fuzz_resources_parser']

Files and Directories in report

This section shows which files and directories are considered in this report. The main reason for showing this is fuzz introspector may include more code in the reasoning than is desired. This section helps identify if too many files/directories are included, e.g. third party code, which may be irrelevant for the threat model. In the event too much is included, fuzz introspector supports a configuration file that can exclude data from the report. See the following link for more information on how to create a config file: link

Files in report

Source file Reached by Covered by
[] []
c7n_gcp.resources.sql ['fuzz_gcp_resources_process'] []
google.api_core.grpc_helpers [] []
google.cloud.logging_v2.services.config_service_v2.transports.grpc_asyncio [] []
c7n_gcp.resources.datafusion [] []
c7n.testing [] []
c7n.resources.efs ['fuzz_resources_validate'] []
google.cloud.monitoring_v3.services.service_monitoring_service.transports.grpc [] []
google.gapic.metadata.gapic_metadata_pb2 [] []
google.cloud.storage.blob [] []
botocore.waiter [] []
google.oauth2.challenges [] []
google.cloud.logging_v2.types [] []
botocore.config ['fuzz_resources_process', 'fuzz_actions_process'] []
sqlite3 [] []
google.cloud.logging_v2.services.metrics_service_v2.transports.base [] []
google.api_core.operations_v1.operations_async_client [] []
google.api_core.future._helpers [] []
c7n_gcp.resources.bigquery [] []
c7n.resources.waf [] []
c7n.resources.bedrock [] []
c7n_gcp.resources.pubsub [] []
httplib2 [] []
c7n.resources.directconnect [] []
google.cloud.monitoring_v3.services.group_service.transports.grpc_asyncio [] []
google.oauth2._credentials_async [] []
botocore.utils ['fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_resources_process', 'fuzz_gcp_filters_validate_process', 'fuzz_actions_process', 'fuzz_gcp_resources_process', 'fuzz_resources_validate'] []
c7n.resources.ml ['fuzz_resources_process'] []
google.cloud.monitoring.gapic_version [] []
google.api.distribution_pb2 [] []
c7n.ufuncs.s3crypt [] []
botocore.docs.waiter [] []
google.cloud.storage.retry [] []
google.cloud.logging_v2.services.metrics_service_v2.transports [] []
google.cloud.monitoring_v3.services.alert_policy_service.transports.grpc_asyncio [] []
aws_xray_sdk [] []
c7n.cli [] []
google.cloud.monitoring_v3.services.uptime_check_service.pagers [] []
c7n_gcp.output [] []
google.api_core.operations_v1.abstract_operations_base_client [] []
google.cloud.logging.handlers.middleware [] []
google.protobuf.timestamp [] []
google.type.latlng_pb2 [] []
setproctitle [] []
google.cloud.monitoring_v3.services.notification_channel_service.transports.grpc_asyncio [] []
google.resumable_media._helpers [] []
google.auth._helpers [] []
google.api.documentation_pb2 [] []
google.protobuf.testdata [] []
c7n.resources.elasticache [] []
google.api_core.retry.retry_streaming [] []
asyncio [] []
c7n.cache ['fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_actions_validate', 'fuzz_filters_validate', 'fuzz_actions_process', 'fuzz_actions_parser', 'fuzz_gcp_resources_process', 'fuzz_resources_validate'] []
google.protobuf.internal.python_edition_defaults [] []
c7n.resources.vpc ['fuzz_resources_process', 'fuzz_resources_validate'] []
c7n.resources.cw [] []
google.api.field_info_pb2 [] []
google.cloud.monitoring_v3.types.alert [] []
google.api.consumer_pb2 [] []
subprocess [] []
c7n.resources.elasticsearch ['fuzz_resources_process'] []
google.cloud.logging_v2._instrumentation [] []
botocore.docs.params [] []
grpc_status [] []
botocore.eventstream [] []
google.auth.crypt [] []
google.auth.aio.transport.sessions [] []
google.api.quota_pb2 [] []
google.api_core.page_iterator [] []
google.api_core.operations_v1.transports.base [] []
google.auth.compute_engine.credentials [] []
google.auth.external_account_authorized_user [] []
google.cloud.logging_v2.logger [] []
botocore.regions [] []
google.protobuf.any_pb2 [] []
c7n.filters.core ['fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_actions_validate', 'fuzz_resources_process', 'fuzz_filters_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_actions_process', 'fuzz_actions_parser', 'fuzz_gcp_resources_process', 'fuzz_resources_validate'] []
struct [] []
c7n.resources.ram [] []
c7n.resources.dms [] []
c7n.vendored.distutils [] []
c7n.resources.cloudtrail ['fuzz_resources_process', 'fuzz_resources_validate'] []
google.resumable_media.requests._request_helpers [] []
c7n.filters.multiattr ['fuzz_filters_process', 'fuzz_resources_process', 'fuzz_filters_validate', 'fuzz_gcp_filters_validate_process'] []
google.protobuf.pyext.cpp_message [] []
google.cloud.appengine_logging [] []
botocore.retries.special [] []
google.cloud.monitoring_v3.services.metric_service.transports [] []
google.cloud.monitoring_v3.services.snooze_service.transports [] []
botocore.crt.auth [] []
google.cloud.monitoring [] []
google.cloud.monitoring_v3.services [] []
c7n.actions.autotag ['fuzz_actions_process'] []
csv [] []
c7n.resources.servicecatalog ['fuzz_resources_validate'] []
botocore.httpchecksum [] []
google.api_core.future.base [] []
c7n.resources.fsx [] []
c7n.resources.datapipeline [] []
c7n_gcp.mu [] []
google.cloud.audit.bigquery_audit_metadata_pb2 [] []
google.oauth2.webauthn_handler_factory [] []
google.api_core.client_options [] []
c7n.resources.sar ['fuzz_resources_process'] []
google.api_core.rest_streaming_async [] []
c7n_gcp.resources.source [] []
google.cloud.logging_v2.services.config_service_v2.client [] []
posixpath [] []
c7n_gcp.resources.mlengine [] []
c7n_gcp.resources.resource_map [] []
grpc_gcp [] []
google.type.timeofday_pb2 [] []
google.cloud.monitoring_v3.services.group_service.transports [] []
google.protobuf.internal.builder [] []
google.api_core.retry.retry_base [] []
binascii [] []
google.cloud.logging_v2.resource [] []
c7n_gcp.utils [] []
google.auth.crypt._cryptography_rsa [] []
botocore.docs.service [] []
c7n.resources.secretsmanager ['fuzz_resources_process'] []
c7n.resources.securityhub ['fuzz_resources_process', 'fuzz_resources_validate'] []
proto [] []
c7n.resources.eventbridge [] []
google.cloud.logging_v2.services.logging_service_v2.transports [] []
google.cloud.logging_v2.client [] []
google.api_core.operations_v1 [] []
c7n.executor [] []
google.api_core.rest_helpers [] []
c7n.filters.costhub [] []
google.protobuf.type_pb2 [] []
...fuzz_filters_parser ['fuzz_filters_parser'] []
google.api_core.retry [] []
google.auth.aio [] []
warnings [] []
google.api_core.gapic_v1.config [] []
c7n.resources ['fuzz_filters_process', 'fuzz_filters_validate'] []
c7n_gcp.filters.timerange ['fuzz_gcp_filters_validate_process'] []
mimetypes [] []
google.auth.aio.transport.aiohttp [] []
google.cloud.monitoring_v3.types.group [] []
google.iam.v1 [] []
google.api.label_pb2 [] []
google.cloud.monitoring_v3.services.alert_policy_service.transports.base [] []
c7n.config [] []
c7n.manager ['fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_actions_validate', 'fuzz_filters_validate', 'fuzz_actions_process', 'fuzz_actions_parser', 'fuzz_gcp_resources_process', 'fuzz_resources_validate'] []
c7n.resources.org [] []
c7n_gcp.resources.storage [] []
sys [] []
zlib [] []
google.auth.version [] []
c7n_gcp.actions.labels ['fuzz_gcp_actions_validate_process'] []
grpc [] []
awscrt [] []
google.cloud.storage.fileio [] []
google.api.error_reason_pb2 [] []
c7n.actions.autoscaling ['fuzz_actions_process'] []
c7n.resources.asg ['fuzz_resources_validate'] []
google.cloud.monitoring_v3.services.snooze_service [] []
c7n_azure [] []
c7n.resources.dlm [] []
botocore.vendored.six [] []
google.cloud.storage.acl [] []
c7n.resources.kafka ['fuzz_resources_validate'] []
botocore.paginate ['fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_resources_process', 'fuzz_gcp_filters_validate_process', 'fuzz_actions_process', 'fuzz_gcp_resources_process'] []
c7n.resources.appelb [] []
google.cloud.storage.version [] []
google.cloud.logging_v2.handlers.app_engine [] []
c7n_gcp.resources [] []
botocore.docs.translator [] []
c7n_left [] []
google.cloud.storage.bucket [] []
c7n.resources.swf [] []
c7n.resources.awslambda ['fuzz_resources_process', 'fuzz_resources_validate'] []
c7n.resources.iam ['fuzz_resources_process'] []
google.protobuf.service_reflection [] []
google.cloud.logging_v2.metric [] []
google.cloud.monitoring_v3.types.service_service [] []
botocore.retries [] []
zipfile [] []
email [] []
google.auth._oauth2client [] []
google.cloud.monitoring_v3.services.service_monitoring_service.transports [] []
google.api_core.operations_v1.abstract_operations_client [] []
botocore.vendored.requests.packages.urllib3.exceptions [] []
google.auth.jwt [] []
c7n.resources.globalaccelerator [] []
google.protobuf.proto_builder [] []
c7n.resources.mq ['fuzz_resources_process'] []
google.cloud.monitoring_v3.services.query_service.async_client [] []
importlib [] []
configparser [] []
google.api.policy_pb2 [] []
botocore.docs.method [] []
google.cloud.storage.batch [] []
argparse [] []
google.cloud.monitoring_v3.services.metric_service.transports.grpc [] []
google.protobuf [] []
google.cloud.monitoring_v3.services.service_monitoring_service.client [] []
c7n.filters.revisions ['fuzz_filters_process', 'fuzz_filters_validate'] []
botocore.auth [] []
google.longrunning.operations_grpc_pb2 [] []
botocore.parsers [] []
google.protobuf.unknown_fields [] []
google.cloud.storage.client [] []
google.cloud.logging_v2.services.metrics_service_v2.pagers [] []
google.cloud.monitoring_v3.types.dropped_labels [] []
traceback [] []
c7n_gcp.resources.artifactregistry [] []
botocore.docs.paginator [] []
c7n.resources.resource_map [] []
google.auth.downscoped [] []
c7n.query ['fuzz_resources_process'] []
google.cloud.monitoring_v3.services.group_service.transports.base [] []
c7n.credentials ['fuzz_actions_process'] []
google.cloud.logging_v2.handlers.transports [] []
google.cloud.monitoring_v3.types.snooze_service [] []
google.protobuf.internal.type_checkers [] []
shutil [] []
google.api_core.page_iterator_async [] []
c7n.resources.s3control ['fuzz_resources_process'] []
platform [] []
google.oauth2._id_token_async [] []
c7n_gcp.resources.certificatemanager [] []
google.auth.crypt.rsa [] []
google.cloud.monitoring_v3.services.service_monitoring_service.transports.grpc_asyncio [] []
c7n.sqsexec [] []
google.protobuf.json_format [] []
google.protobuf.internal.encoder [] []
google.cloud.logging_v2.types.logging [] []
google.cloud.monitoring_v3.services.notification_channel_service [] []
google.cloud.monitoring_v3.services.metric_service.transports.base [] []
botocore.vendored [] []
google.auth.transport [] []
google.cloud.storage._helpers [] []
c7n.commands [] []
botocore.docs.utils [] []
c7n.resources.lakeformation [] []
botocore.response [] []
c7n.resources.health [] []
google.api.service_pb2 [] []
google.api.log_pb2 [] []
pyrate_limiter [] []
c7n.resolver ['fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_resources_process', 'fuzz_gcp_filters_validate_process', 'fuzz_actions_process', 'fuzz_gcp_resources_process'] []
google.cloud.logging_v2.services.config_service_v2 [] []
botocore.monitoring ['fuzz_actions_process'] []
botocore.retryhandler [] []
c7n.filters.backup ['fuzz_filters_process'] []
google.protobuf.internal.message_listener [] []
c7n_gcp.resources.iam [] []
google.iam.v1.options_pb2_grpc [] []
google.auth.exceptions [] []
google.cloud.logging_v2.services.config_service_v2.transports.base [] []
c7n.deprecated [] []
c7n_gcp.filters.labels ['fuzz_gcp_filters_validate_process'] []
google.rpc.code_pb2 [] []
atexit [] []
c7n.resources.datasync [] []
google.cloud.logging_v2.types.logging_config [] []
google.auth.aio.credentials [] []
google.oauth2._client [] []
google.cloud.logging_v2.services.metrics_service_v2.transports.grpc [] []
google.cloud.appengine_logging_v1.services [] []
botocore.validate ['fuzz_resources_process', 'fuzz_resources_validate'] []
threading [] []
c7n.ufuncs [] []
google.iam.v1.logging [] []
google.api.control_pb2 [] []
google.resumable_media.requests.download [] []
c7n.resources.athena [] []
c7n.resources.memorydb [] []
botocore.retries.standard [] []
google.auth.api_key [] []
copyreg [] []
google.cloud.monitoring_v3.gapic_version [] []
c7n.cwe [] []
google.auth._credentials_base [] []
google.api_core.timeout [] []
c7n.resources.cloudsearch [] []
google.protobuf.pyext [] []
jsonpatch [] []
google.cloud.monitoring_v3.services.service_monitoring_service.pagers [] []
botocore.session ['fuzz_actions_process'] []
google.cloud.logging_v2.services.logging_service_v2.async_client [] []
tempfile [] []
botocore.compat ['fuzz_actions_process'] []
requests [] []
google.cloud.storage.constants [] []
dateutil [] []
botocore.httpsession ['fuzz_actions_process'] []
google.api_core.bidi_async [] []
google.auth._constants [] []
c7n.resources.ebs ['fuzz_resources_process', 'fuzz_actions_process'] []
c7n_gcp.resources.dns [] []
google.api_core.operation [] []
google.auth.transport.mtls [] []
c7n.policy ['fuzz_filters_process', 'fuzz_filters_validate'] []
google.rpc.context.audit_context_pb2 [] []
google.cloud.logging_v2.gapic_version [] []
c7n.actions.notify ['fuzz_gcp_actions_validate_process', 'fuzz_actions_validate', 'fuzz_actions_process'] []
google._upb._message [] []
google.protobuf.field_mask_pb2 [] []
html [] []
itertools [] []
urllib3 [] []
c7n.reports.csvout [] []
c7n_gcp.actions [] []
google.api.monitoring_pb2 [] []
c7n.loader ['fuzz_filters_process', 'fuzz_filters_validate'] []
crcmod [] []
c7n.resources.opensearch [] []
c7n_kube [] []
google.cloud.logging_v2.services.logging_service_v2.transports.grpc_asyncio [] []
google.cloud.monitoring_v3.services.query_service.pagers [] []
google.cloud.monitoring_v3.services.query_service.transports.base [] []
c7n_gcp.filters.sccfindings ['fuzz_gcp_filters_validate_process'] []
google.api_core.gapic_v1.method_async [] []
sphinx [] []
botocore.crt [] []
google.cloud.monitoring_v3.services.alert_policy_service [] []
google.cloud.monitoring_v3.services.snooze_service.transports.grpc_asyncio [] []
c7n.resources.quicksight [] []
google.cloud.logging_v2.entries [] []
c7n.resources.discovery [] []
google.auth.transport._aiohttp_requests [] []
c7n.exceptions [] []
google.protobuf.text_encoding [] []
google.cloud.monitoring_v3.services.group_service [] []
botocore.docs.bcdoc.restdoc [] []
c7n.filters.waf ['fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_resources_process', 'fuzz_gcp_filters_validate_process', 'fuzz_actions_process'] []
google.cloud.monitoring_v3.services.notification_channel_service.async_client [] []
rsa [] []
google.cloud.appengine_logging_v1 [] []
google.cloud._testing [] []
google.api_core.iam [] []
google.cloud.logging_v2.handlers.middleware [] []
c7n.filters [] []
google.cloud.monitoring_v3.services.metric_service.transports.grpc_asyncio [] []
google.cloud.logging_v2.services.config_service_v2.pagers [] []
google.cloud.logging_v2.services.logging_service_v2.pagers [] []
google.cloud.logging_v2.services.logging_service_v2.transports.base [] []
google.oauth2.sts [] []
google.api.routing_pb2 [] []
google.cloud.version [] []
google.longrunning.operations_proto [] []
google.cloud.monitoring_v3.services.uptime_check_service.transports.base [] []
google.cloud.monitoring_v3.services.alert_policy_service.transports [] []
google.cloud.logging_v2._gapic [] []
botocore.serialize [] []
google.cloud.logging_v2.handlers.transports.base [] []
cachetools [] []
c7n_gcp.resources.secret [] []
google._async_resumable_media._helpers [] []
google.api_core.operations_v1.transports.rest_asyncio [] []
hmac [] []
google.type.datetime_pb2 [] []
google.cloud.logging_v2.handlers.container_engine [] []
google.auth.transport.requests [] []
c7n.resources.appsync [] []
c7n.resources.eks ['fuzz_resources_validate'] []
google.cloud.monitoring_v3.types.span_context [] []
jwt [] []
c7n_gcp.entry [] []
botocore.endpoint_provider [] []
google.protobuf.runtime_version [] []
c7n.resources.rdscluster ['fuzz_resources_validate'] []
c7n.provider ['fuzz_filters_process', 'fuzz_filters_validate'] []
google.oauth2.webauthn_types [] []
botocore.docs.shape [] []
google.cloud.storage._http [] []
google.cloud.logging.gapic_version [] []
c7n_gcp.region [] []
c7n.resources.inspector2 [] []
google.auth.transport._requests_base [] []
google.cloud.monitoring_v3.services.query_service.transports.grpc_asyncio [] []
google.cloud.monitoring_v3.services.service_monitoring_service.async_client [] []
c7n.resources.kms [] []
google.auth.crypt._python_rsa [] []
google.protobuf.proto_text [] []
botocore.docs.bcdoc [] []
c7n.actions.invoke ['fuzz_actions_process'] []
google.auth.app_engine [] []
pickle [] []
google.auth._exponential_backoff [] []
google.cloud.storage._opentelemetry_tracing [] []
google.resumable_media [] []
google.cloud.monitoring_v3.services.metric_service.pagers [] []
google.cloud.monitoring_v3.services.service_monitoring_service [] []
c7n_gcp.filters.recommender ['fuzz_gcp_filters_validate_process'] []
c7n.resources.acm [] []
google.cloud.monitoring_v3.types.service [] []
c7n_gcp.actions.iampolicy [] []
google.api_core._python_version_support [] []
c7n.resources.code ['fuzz_resources_process'] []
c7n.actions.webhook ['fuzz_actions_process'] []
botocore.endpoint [] []
google.logging.type.http_request_pb2 [] []
c7n_tencentcloud [] []
botocore.hooks ['fuzz_actions_process'] []
c7n.filters.vpc ['fuzz_filters_process', 'fuzz_filters_validate'] []
google.api.system_parameter_pb2 [] []
retrying [] []
botocore.tokens ['fuzz_actions_process'] []
google.api_core.datetime_helpers [] []
c7n.resources.sqs [] []
os [] []
c7n_gcp.resources.spanner [] []
c7n_gcp.resources.build [] []
google.cloud.monitoring_v3.services.uptime_check_service.transports [] []
google.api_core.operations_v1.transports.rest [] []
botocore.docs [] []
botocore.retries.base [] []
botocore.retries.bucket [] []
google.cloud.logging_v2.sink [] []
google.auth._default [] []
google.oauth2 [] []
google.cloud.logging_v2._http [] []
google.cloud.monitoring_v3.types.query_service [] []
google.cloud.monitoring_v3.types.uptime_service [] []
c7n_gcp.resources.gke ['fuzz_gcp_resources_process'] []
google.cloud.logging_v2.types.log_entry [] []
google.protobuf.symbol_database [] []
google.cloud.appengine_logging_v1.types.request_log [] []
c7n.resources.lattice [] []
google.protobuf.duration_pb2 [] []
google.type.date_pb2 [] []
botocore.retries.quota [] []
google.api_core.client_info [] []
botocore.docs.sharedexample [] []
pdb [] []
google.auth.iam [] []
getpass [] []
google.cloud.monitoring_v3.services.query_service.transports.grpc [] []
google.protobuf.struct_pb2 [] []
enum [] []
c7n.resources.cognito [] []
google.cloud.monitoring_v3.services.alert_policy_service.pagers [] []
google.cloud.appengine_logging_v1.types [] []
c7n.resources.artifact [] []
google.protobuf.message_factory [] []
...fuzz_resources_validate ['fuzz_resources_validate'] []
google.api.auth_pb2 [] []
google [] []
google.type.color_pb2 [] []
botocore.compress [] []
google.cloud.client [] []
c7n_gcp.resources.kms ['fuzz_gcp_resources_process'] []
google.cloud.logging_v2.handlers._helpers [] []
google.api.http_pb2 [] []
c7n.resources.ecs [] []
c7n.resources.cloudfront ['fuzz_resources_process', 'fuzz_resources_validate'] []
google._async_resumable_media.requests._request_helpers [] []
typing_extensions [] []
google.api_core._python_package_support [] []
google.cloud.monitoring_v3.services.metric_service [] []
google.auth.transport._custom_tls_signer [] []
botocore.docs.client [] []
google.api_core.client_logging [] []
google.cloud.monitoring_v3.types.metric_service [] []
google.iam.v1.logging.audit_data_pb2 [] []
c7n.resources.opsworks [] []
google.cloud.location.locations_pb2 [] []
google.api_core.retry.retry_unary_async [] []
google.auth._default_async [] []
google.protobuf.util [] []
google.iam.v1.resource_policy_member_pb2 [] []
google.api_core.protobuf_helpers [] []
botocore.args [] []
google.auth._credentials_async [] []
google.auth.aio._helpers [] []
google.cloud.logging_v2.services.config_service_v2.async_client [] []
google.type.interval_pb2 [] []
google.cloud.logging_v2.handlers.middleware.request [] []
c7n_gcp.filters [] []
botocore.exceptions [] []
c7n_gcp.resources.dataproc [] []
c7n_oci [] []
collections [] []
botocore.plugin [] []
google.cloud.audit.audit_log_pb2 [] []
google.protobuf.internal.decoder [] []
botocore.vendored.requests.packages [] []
google.cloud.logging.handlers.transports [] []
google.cloud.monitoring_v3.types.notification_service [] []
google.protobuf.descriptor [] []
google.auth.transport.grpc [] []
google.rpc.context.attribute_context_pb2 [] []
google.cloud._helpers [] []
google.cloud.monitoring_v3.services.snooze_service.async_client [] []
c7n_gcp.handler [] []
google.type.postal_address_pb2 [] []
google.cloud.logging_v2.handlers [] []
logging [] []
botocore.loaders [] []
google.protobuf.wrappers_pb2 [] []
google.auth.environment_vars [] []
c7n.resources.account ['fuzz_resources_process', 'fuzz_resources_validate'] []
weakref [] []
c7n_gcp.policy [] []
google.cloud.logging_v2.services.logging_service_v2.client [] []
google.cloud.obsolete [] []
google.protobuf.internal.extension_dict [] []
c7n.resources.sagemaker [] []
google.cloud.monitoring_v3.services.alert_policy_service.async_client [] []
google.cloud.monitoring_v3.types.group_service [] []
urllib [] []
google.protobuf.internal.wire_format [] []
c7n.resources.keyspaces [] []
google.resumable_media.common [] []
botocore.credentials ['fuzz_actions_process'] []
c7n.resources.appmesh [] []
c7n.resources.comprehend [] []
ipaddress [] []
google.longrunning.operations_pb2 [] []
time [] []
botocore.docs.bcdoc.docstringparser [] []
google.protobuf.internal.field_mask [] []
google.cloud.monitoring_v3.services.group_service.async_client [] []
...fuzz_gcp_filters_validate_process ['fuzz_gcp_filters_validate_process'] []
google.auth._cloud_sdk [] []
google.api.metric_pb2 [] []
tabulate [] []
botocore.handlers [] []
google.cloud.monitoring_v3.services.alert_policy_service.transports.grpc [] []
...fuzz_gcp_actions_validate_process ['fuzz_gcp_actions_validate_process'] []
google.cloud.storage [] []
inspect [] []
c7n.filters.missing ['fuzz_filters_process', 'fuzz_filters_validate'] []
google.api.field_behavior_pb2 [] []
c7n_awscc [] []
google.protobuf.any [] []
google.protobuf.internal.api_implementation [] []
google.protobuf.text_format [] []
c7n.resources.lightsail [] []
google.protobuf.empty_pb2 [] []
c7n_gcp.actions.core ['fuzz_gcp_resources_process'] []
google.protobuf.descriptor_pb2 [] []
xml [] []
c7n.resources.elb [] []
google.iam.v1.iam_policy_pb2_grpc [] []
google.auth.external_account [] []
google.api_core.gapic_v1.client_info [] []
c7n_gcp.resources.armor [] []
c7n.resources.kendra [] []
google._async_resumable_media.requests [] []
google.cloud.monitoring_v3.services.uptime_check_service.transports.grpc_asyncio [] []
google.rpc.status_pb2 [] []
c7n.resources.sfn ['fuzz_resources_process'] []
jmespath [] []
botocore.signers [] []
c7n.resources.rdsparamgroup [] []
OpenSSL [] []
c7n.resources.support [] []
google.cloud.logging_v2.services.metrics_service_v2.client [] []
c7n_gcp.filters.alerts ['fuzz_gcp_filters_validate_process'] []
backports [] []
botocore.discovery [] []
google.cloud.logging.handlers [] []
google._async_resumable_media [] []
google.cloud.extended_operations_pb2 [] []
google.auth.transport.urllib3 [] []
google.cloud.monitoring_v3.services.group_service.client [] []
google.type.decimal_pb2 [] []
google._async_resumable_media._download [] []
google.type.calendar_period_pb2 [] []
contextvars [] []
google.api.source_info_pb2 [] []
google.cloud.monitoring_v3.services.query_service [] []
google.type.money_pb2 [] []
google.protobuf.timestamp_pb2 [] []
...fuzz_resources_parser ['fuzz_resources_parser'] []
google.api_core.operations_v1.transports [] []
c7n.filters.offhours ['fuzz_filters_process', 'fuzz_filters_parser', 'fuzz_filters_validate', 'fuzz_gcp_filters_validate_process'] []
botocore.errorfactory [] []
c7n_gcp.resources.cloudbilling [] []
typing [] []
c7n.resources.firewall [] []
google.auth.identity_pool [] []
c7n.actions.metric ['fuzz_actions_process'] []
c7n.resources.lex [] []
botocore.vendored.requests [] []
google.resumable_media._upload [] []
[] []
c7n.resources.batch ['fuzz_resources_process'] []
google.cloud.audit [] []
c7n_gcp.resources.compute ['fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process'] []
google.protobuf.proto_json [] []
google.cloud.monitoring_v3.types.notification [] []
google.api.config_change_pb2 [] []
c7n.varfmt [] []
ctypes [] []
google.protobuf.api_pb2 [] []
google.cloud.logging_v2.handlers.transports.sync [] []
google.rpc.http_pb2 [] []
google.resumable_media.requests.upload [] []
google.api.visibility_pb2 [] []
uuid [] []
google.oauth2.reauth [] []
c7n.data [] []
google.auth.pluggable [] []
packaging [] []
google.auth.compute_engine._metadata [] []
googleapiclient [] []
google.cloud.monitoring_v3.services.metric_service.client [] []
c7n.element ['fuzz_resources_process'] []
google.cloud.monitoring_v3.types.mutation_record [] []
google.api_core.future.async_future [] []
google.auth.crypt.base [] []
google.cloud.monitoring_v3.services.snooze_service.transports.grpc [] []
c7n.resources.rds ['fuzz_resources_validate'] []
google.api_core.version_header [] []
google.auth.metrics [] []
google.cloud.storage.notification [] []
google.api.client_pb2 [] []
c7n.resources.qldb [] []
jsonschema [] []
xform_name [] []
google.api.usage_pb2 [] []
c7n.utils ['fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_query_parser', 'fuzz_actions_validate', 'fuzz_resources_process', 'fuzz_filters_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_actions_process', 'fuzz_gcp_resources_process', 'fuzz_resources_validate'] []
google.protobuf.compiler.plugin_pb2 [] []
google.api_core.bidi_base [] []
...fuzz_query_parser ['fuzz_query_parser'] []
google.protobuf.internal.well_known_types [] []
c7n_gcp.filters.iampolicy ['fuzz_gcp_filters_validate_process'] []
google.api.resource_pb2 [] []
calendar [] []
c7n.filters.health ['fuzz_filters_process'] []
google.protobuf.descriptor_database [] []
google.protobuf.internal [] []
c7n.lookup [] []
c7n_gcp.resources.resourcemanager ['fuzz_gcp_resources_process'] []
re [] []
google.cloud.logging_v2.services.config_service_v2.transports.grpc [] []
google.api.logging_pb2 [] []
google.api_core.extended_operation [] []
c7n.resources.simpledb [] []
c7n_gcp.resources.network [] []
botocore.useragent ['fuzz_actions_process'] []
google.api.billing_pb2 [] []
c7n.resources.ecr ['fuzz_resources_validate'] []
google.cloud.monitoring_v3.services.notification_channel_service.transports [] []
google.cloud.storage._signing [] []
google.oauth2._service_account_async [] []
base64 [] []
c7n.filters.config [] []
google.api_core.gapic_v1.routing_header [] []
c7n.filters.iamaccess ['fuzz_filters_process', 'fuzz_resources_process'] []
google.auth.crypt._helpers [] []
google.cloud.common_resources_pb2 [] []
google.cloud.monitoring_v3.services.alert_policy_service.client [] []
google.cloud.monitoring_v3.services.uptime_check_service.async_client [] []
google_auth_httplib2 [] []
botocore.docs.bcdoc.style [] []
c7n.version [] []
google.cloud.logging_v2.handlers.transports.background_thread [] []
c7n.resources.xray [] []
google.auth.compute_engine [] []
google.cloud.logging_v2.types.logging_metrics [] []
botocore.configloader [] []
queue [] []
gzip [] []
c7n_gcp.client [] []
dataclasses [] []
c7n_gcp.resources.bigtable [] []
unittest [] []
c7n.tags [] []
google.auth._service_account_info [] []
google.oauth2.webauthn_handler [] []
operator [] []
google.cloud.logging_v2._helpers [] []
c7n_gcp.resources.cloudrun ['fuzz_gcp_filters_validate_process'] []
google.api_core.retry.retry_unary [] []
google.cloud.monitoring_v3.services.group_service.pagers [] []
c7n.resources.networkmanager [] []
c7n.resources.cfn [] []
google.protobuf.message [] []
google.protobuf.proto [] []
google.cloud.appengine_logging_v1.gapic_version [] []
google.longrunning.operations_proto_pb2 [] []
c7n.ctx ['fuzz_filters_process', 'fuzz_filters_validate'] []
google.type.localized_text_pb2 [] []
google.api_core.general_helpers [] []
...fuzz_filters_process ['fuzz_filters_process'] []
c7n.resources.appflow ['fuzz_resources_process'] []
c7n.reports [] []
google.cloud.monitoring_v3.services.notification_channel_service.transports.base [] []
c7n.resources.ssm ['fuzz_resources_validate'] []
argcomplete [] []
contextlib [] []
google.cloud.monitoring_v3.services.notification_channel_service.transports.grpc [] []
...fuzz_resources_process ['fuzz_resources_process'] []
google.api_core.operations_v1.operations_rest_client_async [] []
botocore.retries.throttling [] []
google.cloud.logging_v2.services.logging_service_v2 [] []
google.protobuf.compiler [] []
c7n.log [] []
google.longrunning.operations_pb2_grpc [] []
c7n.resources.emr ['fuzz_resources_process'] []
google.cloud.monitoring_v3.services.service_monitoring_service.transports.base [] []
c7n.resources.workspaces [] []
importlib_metadata [] []
google.iam.v1.iam_policy_pb2 [] []
google.logging.type.log_severity_pb2 [] []
opentelemetry [] []
c7n.resources.quotas [] []
google.cloud.monitoring_v3.services.query_service.transports [] []
google.api_core.path_template [] []
c7n.resources.pmtcrypt [] []
c7n_openstack [] []
c7n_gcp.provider [] []
google.api_core.rest_streaming [] []
botocore.history [] []
json [] []
google.cloud.exceptions [] []
c7n_gcp.resources.memstore [] []
google.api.monitored_resource_pb2 [] []
c7n_gcp [] []
concurrent [] []
c7n_gcp.resources.osconfig [] []
google.cloud.monitoring_v3.services.notification_channel_service.pagers [] []
flask [] []
c7n.filters.related ['fuzz_filters_process', 'fuzz_resources_process'] []
types [] []
botocore.docs.docstring [] []
c7n.filters.metrics ['fuzz_filters_validate'] []
c7n.filters.iamanalyzer ['fuzz_filters_process'] []
c7n.resources.dynamodb [] []
google.cloud.monitoring_v3.services.uptime_check_service.client [] []
c7n_gcp.resources.dataflow [] []
string [] []
botocore.docs.example [] []
google.cloud.operation [] []
google.cloud.logging_v2.services.config_service_v2.transports [] []
google.api_core.operations_v1.pagers_base [] []
c7n.resources.iot [] []
google.auth [] []
c7n.resources.ec2 ['fuzz_resources_process', 'fuzz_resources_validate'] []
c7n.resources.gamelift [] []
google.cloud.monitoring_v3.types.uptime [] []
google.api_core.universe [] []
google.cloud.logging_v2.services.metrics_service_v2.transports.grpc_asyncio [] []
c7n.resources.sns [] []
c7n_gcp.resources.deploymentmanager [] []
c7n.mu [] []
botocore.awsrequest [] []
socket [] []
google.type.phone_number_pb2 [] []
google.cloud.monitoring_v3.services.snooze_service.pagers [] []
c7n.vendored.distutils.util [] []
cffi [] []
google.cloud.monitoring_v3.query [] []
google.api.httpbody_pb2 [] []
google.protobuf.internal.python_message [] []
google.oauth2.service_account [] []
google.cloud.storage.transfer_manager [] []
c7n.resources.backup [] []
google.type.fraction_pb2 [] []
c7n.resources.kinesis [] []
c7n_gcp.query ['fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process'] []
google.type.quaternion_pb2 [] []
...fuzz_filters_validate ['fuzz_filters_validate'] []
google.api_core.version [] []
google.resumable_media.requests [] []
google.cloud.monitoring_v3._dataframe [] []
google._async_resumable_media.requests.download [] []
botocore.stub [] []
google.cloud.logging_v2.services.metrics_service_v2.async_client [] []
c7n.resources.pinpoint [] []
http [] []
google.auth.credentials [] []
google.cloud.monitoring_v3.services.notification_channel_service.client [] []
google.cloud.monitoring_v3.types [] []
google.iam.v1.policy_pb2 [] []
c7n_gcp.resources.function [] []
google.auth.transport._mtls_helper [] []
google.cloud.environment_vars [] []
c7n.resources.elasticbeanstalk [] []
google.cloud.monitoring_v3 [] []
google.api_core.retry_async [] []
google.protobuf.reflection [] []
c7n.resources.timestream [] []
google._async_resumable_media.requests.upload [] []
google.api.backend_pb2 [] []
c7n.resources.glue ['fuzz_resources_validate'] []
google.api_core.gapic_v1 [] []
yaml [] []
google.cloud.logging_v2.services.logging_service_v2.transports.grpc [] []
google.cloud.storage.hmac_key [] []
google.resumable_media._download [] []
google.api_core.operation_async [] []
google.cloud.monitoring_v3.services.uptime_check_service [] []
google.oauth2._client_async [] []
c7n.filters.policystatement ['fuzz_filters_process', 'fuzz_resources_process'] []
google.auth.crypt.es256 [] []
google.api_core.exceptions [] []
google.cloud.monitoring_v3.services.query_service.client [] []
c7n.resources.storagegw [] []
google.cloud.monitoring_v3.services.uptime_check_service.transports.grpc [] []
google.api.context_pb2 [] []
...fuzz_gcp_resources_process ['fuzz_gcp_resources_process'] []
copy [] []
google.protobuf.duration [] []
google.cloud.appengine_logging.gapic_version [] []
google.rpc.error_details_pb2 [] []
google.api_core.future [] []
google.cloud.logging_v2.handlers.structured_log [] []
google.cloud.monitoring_v3.services.snooze_service.client [] []
botocore.vendored.requests.packages.urllib3 [] []
google.cloud.monitoring_v3.types.metric [] []
c7n.actions [] []
google.oauth2.utils [] []
google.type.expr_pb2 [] []
google.api_core.gapic_v1.config_async [] []
c7n.resources.ses [] []
google.oauth2.gdch_credentials [] []
cryptography [] []
google.auth.aws [] []
pathlib [] []
c7n.resources.shield ['fuzz_resources_process'] []
botocore.client [] []
google._async_resumable_media._upload [] []
google.api_core._rest_streaming_base [] []
c7n.resources.ami ['fuzz_resources_process', 'fuzz_resources_validate'] []
google.cloud.monitoring_v3.services.group_service.transports.grpc [] []
certifi [] []
pyasn1_modules [] []
google.api_core.operations_v1.operations_client_config [] []
google.protobuf.descriptor_pool [] []
datetime [] []
google.cloud.monitoring_v3.services.snooze_service.transports.base [] []
google.api_core.operations_v1.operations_client [] []
random [] []
math [] []
c7n.resources.route53 ['fuzz_resources_process', 'fuzz_resources_validate'] []
c7n_gcp.actions.cscc ['fuzz_gcp_actions_validate_process'] []
botocore.configprovider ['fuzz_actions_process'] []
...fuzz_actions_validate ['fuzz_actions_validate'] []
google.oauth2.id_token [] []
google.auth.aio.transport [] []
google.oauth2.credentials [] []
google.api_core.operations_v1.pagers [] []
c7n.structure ['fuzz_filters_process', 'fuzz_filters_validate'] []
google.cloud.logging [] []
c7n.actions.policy ['fuzz_resources_process'] []
c7n.handler [] []
c7n.resources.airflow ['fuzz_resources_process'] []
google.oauth2._reauth_async [] []
google.cloud.monitoring_v3.services.metric_service.async_client [] []
google.cloud.logging_v2.services.metrics_service_v2 [] []
google.api_core.bidi [] []
google.iam.v1.policy_pb2_grpc [] []
c7n_gcp.resources.appengine [] []
c7n.resources.connect [] []
botocore.translate [] []
google.protobuf.source_context_pb2 [] []
google.api_core.grpc_helpers_async [] []
google.api_core [] []
c7n.resources.aws ['fuzz_resources_parser', 'fuzz_resources_process', 'fuzz_resources_validate'] []
google.cloud.storage.iam [] []
c7n_gcp.actions.notify ['fuzz_gcp_actions_validate_process'] []
pyasn1 [] []
google.cloud.logging_v2 [] []
google.iam.v1.options_pb2 [] []
google.type.month_pb2 [] []
psutil [] []
c7n.resources.snowball [] []
google.cloud.monitoring_v3.types.common [] []
c7n.resources.config [] []
google.api.launch_stage_pb2 [] []
aiohttp [] []
google.auth.transport._http_client [] []
google.protobuf.internal.enum_type_wrapper [] []
c7n.schema [] []
io [] []
c7n.resources.directory [] []
google.type.dayofweek_pb2 [] []
c7n.filters.kms ['fuzz_filters_process'] []
c7n_gcp.resources.service [] []
c7n.registry ['fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_actions_validate', 'fuzz_resources_process', 'fuzz_filters_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_actions_process', 'fuzz_actions_parser', 'fuzz_gcp_resources_process', 'fuzz_resources_validate'] []
c7n.actions.network ['fuzz_actions_validate'] []
google.api.endpoint_pb2 [] []
atheris [] []
google.api_core.retry.retry_streaming_async [] []
google.protobuf.internal.testing_refleaks [] []
c7n [] []
google.api_core.future.polling [] []
hashlib [] []
c7n.resources.transfer [] []
fnmatch [] []
c7n.resources.devicefarm [] []
c7n.resources.redshift ['fuzz_resources_validate'] []
c7n.resources.guardduty [] []
decimal [] []
c7n_gcp.filters.metrics ['fuzz_gcp_filters_validate_process'] []
boto3 [] []
botocore.model [] []
google.auth._refresh_worker [] []
google.cloud._http [] []
botocore [] []
c7n.vendored.distutils.version ['fuzz_resources_process', 'fuzz_gcp_filters_validate_process', 'fuzz_gcp_resources_process', 'fuzz_resources_validate'] []
pandas [] []
google.api_core.gapic_v1.method [] []
c7n_gcp.resources.notebook [] []
c7n_gcp.resources.loadbalancer [] []
shlex [] []
gc [] []
c7n.resources.servicediscovery [] []
botocore.retries.adaptive [] []
botocore.context [] []
c7n.resources.accessanalyzer [] []
google.cloud.monitoring_v3.types.snooze [] []
c7n.resources.appstream [] []
c7n.output ['fuzz_filters_process', 'fuzz_filters_validate'] []
botocore.vendored.requests.exceptions [] []
c7n.resources.hsm [] []
functools [] []
google.auth._jwt_async [] []
c7n.resources.fis [] []
google.protobuf.internal.containers [] []
google.api_core.operations_v1.pagers_async [] []
google.cloud.logging_v2.services [] []
...fuzz_actions_process ['fuzz_actions_process'] []
c7n.resources.budgets [] []
google.cloud.logging_v2.handlers.handlers [] []
google.cloud.monitoring_v3.types.alert_service [] []
google.cloud.logging_v2.handlers._monitored_resources [] []
c7n.resources.apigw [] []
c7n.actions.core ['fuzz_filters_process', 'fuzz_gcp_actions_validate_process', 'fuzz_filters_parser', 'fuzz_actions_validate', 'fuzz_resources_process', 'fuzz_filters_validate', 'fuzz_gcp_filters_validate_process', 'fuzz_actions_process', 'fuzz_actions_parser', 'fuzz_gcp_resources_process'] []
textwrap [] []
google.longrunning.operations_grpc [] []
google.api.annotations_pb2 [] []
c7n_gcp.resources.logging [] []
c7n.resources.s3 ['fuzz_resources_process', 'fuzz_actions_process', 'fuzz_resources_validate'] []
c7n.resources.glacier [] []
google.auth.impersonated_credentials [] []
...fuzz_actions_parser ['fuzz_actions_parser'] []
google_crc32c [] []

Directories in report

Directory

Metadata section

This sections shows the raw data that is used to produce this report. This is mainly used for further processing and developer debugging.

Fuzzer Calltree file Program data file Coverage file
fuzz_filters_process fuzzerLogFile-fuzz_filters_process.data fuzzerLogFile-fuzz_filters_process.data.yaml all_cov.json
fuzz_gcp_actions_validate_process fuzzerLogFile-fuzz_gcp_actions_validate_process.data fuzzerLogFile-fuzz_gcp_actions_validate_process.data.yaml all_cov.json
fuzz_resources_parser fuzzerLogFile-fuzz_resources_parser.data fuzzerLogFile-fuzz_resources_parser.data.yaml all_cov.json
fuzz_filters_parser fuzzerLogFile-fuzz_filters_parser.data fuzzerLogFile-fuzz_filters_parser.data.yaml all_cov.json
fuzz_query_parser fuzzerLogFile-fuzz_query_parser.data fuzzerLogFile-fuzz_query_parser.data.yaml all_cov.json
fuzz_actions_validate fuzzerLogFile-fuzz_actions_validate.data fuzzerLogFile-fuzz_actions_validate.data.yaml all_cov.json
fuzz_resources_process fuzzerLogFile-fuzz_resources_process.data fuzzerLogFile-fuzz_resources_process.data.yaml all_cov.json
fuzz_filters_validate fuzzerLogFile-fuzz_filters_validate.data fuzzerLogFile-fuzz_filters_validate.data.yaml all_cov.json
fuzz_gcp_filters_validate_process fuzzerLogFile-fuzz_gcp_filters_validate_process.data fuzzerLogFile-fuzz_gcp_filters_validate_process.data.yaml all_cov.json
fuzz_actions_process fuzzerLogFile-fuzz_actions_process.data fuzzerLogFile-fuzz_actions_process.data.yaml all_cov.json
fuzz_actions_parser fuzzerLogFile-fuzz_actions_parser.data fuzzerLogFile-fuzz_actions_parser.data.yaml all_cov.json
fuzz_gcp_resources_process fuzzerLogFile-fuzz_gcp_resources_process.data fuzzerLogFile-fuzz_gcp_resources_process.data.yaml all_cov.json
fuzz_resources_validate fuzzerLogFile-fuzz_resources_validate.data fuzzerLogFile-fuzz_resources_validate.data.yaml all_cov.json