Fuzz introspector: fuzz_sign_with_invalid_key
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
3 7 ...model-transparency.tests.fuzzing.fuzz_sign_with_invalid_key.TestOneInput call site: 00007 .open
2 1 ...model-transparency.tests.fuzzing.fuzz_sign_with_invalid_key.TestOneInput call site: 00001 fdp.ConsumeIntInRange
2 4 ...model-transparency.tests.fuzzing.fuzz_sign_with_invalid_key.TestOneInput call site: 00004 tempfile.TemporaryDirectory
1 13 ...model-transparency.tests.fuzzing.fuzz_sign_with_invalid_key.TestOneInput call site: 00013 os.path.join
1 15 ...model-transparency.tests.fuzzing.fuzz_sign_with_invalid_key.TestOneInput call site: 00015 signer.sign

Fuzzer calltree

0 ...model-transparency.tests.fuzzing.fuzz_sign_with_invalid_key.TestOneInput [function] [call site] 00000
1 atheris.FuzzedDataProvider [function] [call site] 00001
1 fdp.ConsumeIntInRange [function] [call site] 00002
1 fdp.ConsumeBytes [function] [call site] 00003
1 <builtin>.print [function] [call site] 00004
1 tempfile.TemporaryDirectory [function] [call site] 00005
1 os.path.join [function] [call site] 00006
1 fdp.ConsumeIntInRange [function] [call site] 00007
1 <builtin>.open [function] [call site] 00008
1 fdp.ConsumeBytes [function] [call site] 00009
1 os.path.join [function] [call site] 00011
1 <builtin>.open [function] [call site] 00012
1 os.path.join [function] [call site] 00014
1 scfg.use_elliptic_key_signer [function] [call site] 00015
1 signer.sign [function] [call site] 00016