Fuzz introspector: Zip4jFuzzer
For issues and ideas: https://github.com/ossf/fuzz-introspector/issues

Fuzz blockers

The following nodes represent call sites where fuzz blockers occur.

Amount of callsites blocked Calltree index Parent function Callsite Largest blocked function
17 0 EP call site: 00000 [net.lingala.zip4j.io.inputstream.ZipInputStream].getNextEntry()

Fuzzer calltree

0 [Zip4jFuzzer].fuzzerTestOneInput(com.code_intelligence.jazzer.api.FuzzedDataProvider) [function] [call site] 00000
1 [com.code_intelligence.jazzer.api.FuzzedDataProvider].consumeRemainingAsBytes() [function] [call site] 00001
1 [java.io.ByteArrayInputStream].<init>(byte[]) [function] [call site] 00002
1 [net.lingala.zip4j.io.inputstream.ZipInputStream].<init>(java.io.ByteArrayInputStream) [function] [call site] 00003
1 [net.lingala.zip4j.io.inputstream.ZipInputStream].getNextEntry() [function] [call site] 00004
2 [net.lingala.zip4j.io.inputstream.ZipInputStream].getNextEntry(null,boolean) [function] [call site] 00005
1 [net.lingala.zip4j.model.LocalFileHeader].isDirectory() [function] [call site] 00006
1 [net.lingala.zip4j.model.LocalFileHeader].isEncrypted() [function] [call site] 00007
1 [net.lingala.zip4j.model.LocalFileHeader].getAesExtraDataRecord() [function] [call site] 00008
1 [Zip4jFuzzer].getCompressionMethod() [function] [call site] 00009
1 [Zip4jFuzzer].getDataSize() [function] [call site] 00010
1 [net.lingala.zip4j.model.LocalFileHeader].getCompressionMethod() [function] [call site] 00011
1 [Zip4jFuzzer].getCode() [function] [call site] 00012
1 [net.lingala.zip4j.model.LocalFileHeader].getEncryptionMethod() [function] [call site] 00013
1 [net.lingala.zip4j.model.LocalFileHeader].getExtraDataRecords() [function] [call site] 00014
1 [net.lingala.zip4j.model.LocalFileHeader].getZip64ExtendedInfo() [function] [call site] 00015
1 [Zip4jFuzzer].getCompressedSize() [function] [call site] 00016
1 [Zip4jFuzzer].getUncompressedSize() [function] [call site] 00017