Fuzz introspector: fuzz_jwe
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
19 0 EP call site: 00000 jose.jwe.get_unverified_header

Fuzzer calltree

0 ...fuzz_jwe.TestOneInput [function] [call site] 00000
1 atheris.FuzzedDataProvider [function] [call site] 00001
1 fdp.ConsumeIntInRange [function] [call site] 00002
1 fdp.ConsumeUnicodeNoSurrogates [function] [call site] 00003
1 jose.jwe.get_unverified_header [function] [call site] 00004
2 jose.jwe._jwe_compact_deserialize [function] [call site] 00005
3 jose.utils.ensure_binary [function] [call site] 00006
4 <builtin>.isinstance [function] [call site] 00007
4 <builtin>.isinstance [function] [call site] 00008
3 jwe_bytes.split [function] [call site] 00010
3 jose.utils.base64url_decode [function] [call site] 00011
4 <builtin>.len [function] [call site] 00012
4 base64.urlsafe_b64decode [function] [call site] 00013
3 json.loads [function] [call site] 00014
3 <builtin>.isinstance [function] [call site] 00015
3 jose.utils.base64url_decode [function] [call site] 00016
3 jose.utils.base64url_decode [function] [call site] 00017
3 jose.utils.base64url_decode [function] [call site] 00018
3 jose.utils.base64url_decode [function] [call site] 00019