Fuzz introspector: pcap_fuzzer
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
14 0 EP call site: 00000 scapy.utils.rdpcap

Fuzzer calltree

0 ...pcap_fuzzer.TestOneInput [function] [call site] 00000
1 io.BytesIO [function] [call site] 00001
1 scapy.utils.rdpcap [function] [call site] 00002
2 scapy.utils.PcapReader.__init__ [function] [call site] 00003
3 scapy.utils.RawPcapReader.__init__ [function] [call site] 00004
4 typing.cast.read [function] [call site] 00005
4 scapy.arch.windows.structures._win_fifo_open._opened.read [function] [call site] 00006
5 ctypes.create_string_buffer [function] [call site] 00007
5 ctypes.windll.kernel32.ReadFile [function] [call site] 00008
4 <builtin>.len [function] [call site] 00009
4 struct.unpack [function] [call site] 00010
3 scapy.error.warning [function] [call site] 00011
4 log_runtime.warning [function] [call site] 00012
2 fdesc.read_all [function] [call site] 00013
1 p.summary [function] [call site] 00014