Fuzz introspector: fuzz_http11_request_parser
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
2 15 websockets.datastructures.Headers.update call site: {node_id} .isinstance

Fuzzer calltree

0 ...websockets.fuzzing.fuzz_http11_request_parser.test_one_input [function] [call site] 00000
1 websockets.streams.StreamReader.__init__ [function] [call site] 00001
2 .bytearray [function] [call site] 00002
1 websockets.streams.StreamReader.feed_data [function] [call site] 00003
1 websockets.streams.StreamReader.feed_eof [function] [call site] 00004
1 websockets.http11.Request.parse [function] [call site] 00005
2 websockets.http11.parse_line [function] [call site] 00006
3 websockets.streams.StreamReader.read_line [function] [call site] 00007
3 line.endswith [function] [call site] 00009
2 request_line.split [function] [call site] 00010
2 raw_path.decode [function] [call site] 00011
2 websockets.http11.parse_headers [function] [call site] 00012
3 websockets.datastructures.Headers.__init__ [function] [call site] 00013
4 websockets.datastructures.Headers.update [function] [call site] 00014
3 websockets.http11.parse_line [function] [call site] 00020
3 line.split [function] [call site] 00021
3 _token_re.fullmatch [function] [call site] 00022
3 raw_value.strip [function] [call site] 00023
3 _value_re.fullmatch [function] [call site] 00024
3 raw_name.decode [function] [call site] 00025
3 raw_value.decode [function] [call site] 00026
1 .isinstance [function] [call site] 00028