Fuzz introspector: fuzz_decode
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
6 0 EP call site: 00000 pyasn1_modules.pem.readBase64fromText

Fuzzer calltree

0 ...fuzz_decode.TestOneInput [function] [call site] 00000
1 atheris.FuzzedDataProvider [function] [call site] 00001
1 fdp.ConsumeUnicodeNoSurrogates [function] [call site] 00002
1 pyasn1_modules.pem.readBase64fromText [function] [call site] 00003
2 text.encode [function] [call site] 00004
2 base64.b64decode [function] [call site] 00005
1 fdp.PickValueInList [function] [call site] 00006