Fuzz introspector: com.jcraft.jsch.OpenSSHConfigFuzzer
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
10 3 [com.jcraft.jsch.OpenSSHConfigFuzzer].test() call site: {node_id}
1 15 [com.jcraft.jsch.OpenSSHConfig].parse(java.lang.String) call site: {node_id}

Fuzzer calltree

0 [com.jcraft.jsch.OpenSSHConfigFuzzer].fuzzerTestOneInput(com.code_intelligence.jazzer.api.FuzzedDataProvider) [function] [call site] 00000
1 [com.jcraft.jsch.OpenSSHConfigFuzzer]. (com.code_intelligence.jazzer.api.FuzzedDataProvider) [function] [call site] 00001
1 [com.jcraft.jsch.OpenSSHConfigFuzzer].test() [function] [call site] 00002
2 [com.code_intelligence.jazzer.api.CannedFuzzedDataProvider].consumeRemainingAsString() [function] [call site] 00003
3 [jaz.Zer].next() [function] [call site] 00004
4 [jaz.Zer].reportFindingIfEnabled() [function] [call site] 00005
5 [jaz.Zer].isSanitizerEnabled(byte) [function] [call site] 00006
6 [jaz.Zer$equals__2].bootstrap$(java.lang.String) [function] [call site] 00007
7 [jaz.Zer$equals__2]. (java.lang.String) [function] [call site] 00008
5 [jaz.Zer].reportFinding() [function] [call site] 00009
6 [com.code_intelligence.jazzer.api.FuzzerSecurityIssueHigh]. (java.lang.String) [function] [call site] 00010
6 [com.code_intelligence.jazzer.api.Jazzer].reportFindingFromHook(java.lang.Throwable) [function] [call site] 00011
7 [com.code_intelligence.jazzer.api.Jazzer].rethrowUnchecked(java.lang.Throwable) [function] [call site] 00012
7 [com.code_intelligence.jazzer.api.Jazzer].rethrowUnchecked(java.lang.Throwable) [function] [call site] 00013
2 [com.jcraft.jsch.OpenSSHConfig].parse(java.lang.String) [function] [call site] 00014
3 [com.jcraft.jsch.OpenSSHConfig]. (java.io.BufferedReader) [function] [call site] 00015
4 [com.jcraft.jsch.OpenSSHConfig]._parse(java.io.BufferedReader) [function] [call site] 00016