Fuzz introspector: fuzz_decode
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
12 0 EP call site: 00000 simplejson.loads

Fuzzer calltree

0 ...fuzz_decode.TestOneInput [function] [call site] 00000
1 atheris.FuzzedDataProvider [function] [call site] 00001
1 fdp.ConsumeUnicodeNoSurrogates [function] [call site] 00002
1 simplejson.loads [function] [call site] 00003
2 simplejson.decoder.JSONDecoder.decode [function] [call site] 00004
3 <builtin>.isinstance [function] [call site] 00005
3 <builtin>.str [function] [call site] 00006
3 simplejson.decoder.JSONDecoder.raw_decode [function] [call site] 00007
4 <builtin>.isinstance [function] [call site] 00008
4 <builtin>.len [function] [call site] 00009
4 <builtin>.ord [function] [call site] 00010
3 <builtin>.len [function] [call site] 00011
2 simplejson.decoder.JSONDecoder.__init__ [function] [call site] 00012