Datasets:
idx int64 0 7.85k | idx_lca int64 0 223 | offset int64 162 55k | repo stringclasses 62
values | commit_hash stringclasses 113
values | target_file stringclasses 134
values | line_type_lca stringclasses 7
values | ground_truth stringlengths 1 46 | in_completions bool 1
class | completion_type stringclasses 6
values | non_dunder_count_intellij int64 0 529 | non_dunder_count_jedi int64 0 128 | start_with_ bool 2
classes | first_occurrence bool 2
classes | intellij_completions listlengths 1 532 | jedi_completions listlengths 3 148 | prefix stringlengths 162 55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0 | 0 | 1,007 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | Unknown | AnalysisInterface | true | class | 8 | 13 | false | true | [
"List",
"AnalysisInterface",
"analysis_coverage_runtime_analysis",
"logger",
"Tuple",
"get_all_analyses",
"overlay_calltree_with_coverage",
"Dict"
] | [
{
"name": "abc",
"type": "module"
},
{
"name": "analysis_coverage_runtime_analysis",
"type": "function"
},
{
"name": "AnalysisInterface",
"type": "class"
},
{
"name": "Dict",
"type": "class"
},
{
"name": "fuzz_cfg_load",
"type": "module"
},
{
"name": "... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
2 | 0 | 1,333 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | inproject | MergedProjectProfile | true | class | 14 | 19 | false | true | [
"FuzzerProfile",
"List",
"MergedProjectProfile",
"logger",
"None",
"add_func_to_reached_and_clone",
"FunctionProfile",
"load_all_profiles",
"read_fuzzer_data_file_to_profile",
"Any",
"Dict",
"Optional",
"Set",
"Tuple"
] | [
{
"name": "add_func_to_reached_and_clone",
"type": "function"
},
{
"name": "Any",
"type": "class"
},
{
"name": "copy",
"type": "module"
},
{
"name": "Dict",
"type": "class"
},
{
"name": "FunctionProfile",
"type": "class"
},
{
"name": "fuzz_cfg_load",
... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
3 | 0 | 1,409 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | inproject | FuzzerProfile | true | class | 14 | 19 | false | true | [
"FuzzerProfile",
"MergedProjectProfile",
"List",
"logger",
"None",
"add_func_to_reached_and_clone",
"FunctionProfile",
"load_all_profiles",
"read_fuzzer_data_file_to_profile",
"Any",
"Dict",
"Optional",
"Set",
"Tuple"
] | [
{
"name": "add_func_to_reached_and_clone",
"type": "function"
},
{
"name": "Any",
"type": "class"
},
{
"name": "copy",
"type": "module"
},
{
"name": "Dict",
"type": "class"
},
{
"name": "FunctionProfile",
"type": "class"
},
{
"name": "fuzz_cfg_load",
... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
4 | 0 | 1,758 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | Unknown | FuzzerProfile | true | class | 14 | 19 | false | false | [
"FuzzerProfile",
"MergedProjectProfile",
"None",
"Set",
"List",
"add_func_to_reached_and_clone",
"FunctionProfile",
"load_all_profiles",
"logger",
"read_fuzzer_data_file_to_profile",
"Any",
"Dict",
"Optional",
"Tuple"
] | [
{
"name": "add_func_to_reached_and_clone",
"type": "function"
},
{
"name": "Any",
"type": "class"
},
{
"name": "copy",
"type": "module"
},
{
"name": "Dict",
"type": "class"
},
{
"name": "FunctionProfile",
"type": "class"
},
{
"name": "fuzz_cfg_load",
... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
5 | 0 | 2,009 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | inproject | extract_all_callsites | true | function | 8 | 9 | false | true | [
"extract_all_callsites",
"CalltreeCallsite",
"List",
"logger",
"Optional",
"data_file_read_calltree",
"extract_all_callsites_recursive",
"print_ctcs_tree"
] | [
{
"name": "CalltreeCallsite",
"type": "class"
},
{
"name": "data_file_read_calltree",
"type": "function"
},
{
"name": "extract_all_callsites",
"type": "function"
},
{
"name": "extract_all_callsites_recursive",
"type": "function"
},
{
"name": "List",
"type": "c... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
7 | 0 | 2,166 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | inproject | demangle_cpp_func | true | function | 13 | 18 | false | true | [
"List",
"logger",
"Optional",
"demangle_cpp_func",
"scan_executables_for_fuzz_introspector_logs",
"data_file_read_yaml",
"get_all_files_in_tree_with_regex",
"get_target_coverage_url",
"longest_common_prefix",
"normalise_str",
"safe_decode",
"Any",
"Dict"
] | [
{
"name": "Any",
"type": "class"
},
{
"name": "cxxfilt",
"type": "module"
},
{
"name": "data_file_read_yaml",
"type": "function"
},
{
"name": "demangle_cpp_func",
"type": "function"
},
{
"name": "Dict",
"type": "class"
},
{
"name": "get_all_files_in_tr... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
8 | 0 | 2,189 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | inproject | dst_function_name | true | statement | 17 | 17 | false | true | [
"depth",
"cov_ct_idx",
"cov_forward_reds",
"cov_largest_blocked_func",
"cov_link",
"children",
"cov_callsite_link",
"cov_color",
"cov_hitcount",
"cov_parent",
"dst_function_name",
"dst_function_source_file",
"hitcount",
"parent_calltree_callsite",
"src_function_name",
"src_function_sou... | [
{
"name": "children",
"type": "statement"
},
{
"name": "cov_callsite_link",
"type": "statement"
},
{
"name": "cov_color",
"type": "statement"
},
{
"name": "cov_ct_idx",
"type": "statement"
},
{
"name": "cov_forward_reds",
"type": "statement"
},
{
"name... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
9 | 0 | 2,625 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | Unknown | cov_color | true | statement | 17 | 17 | false | true | [
"depth",
"cov_link",
"cov_ct_idx",
"cov_callsite_link",
"cov_forward_reds",
"children",
"cov_color",
"cov_hitcount",
"cov_largest_blocked_func",
"cov_parent",
"dst_function_name",
"dst_function_source_file",
"hitcount",
"parent_calltree_callsite",
"src_function_name",
"src_function_sou... | [
{
"name": "children",
"type": "statement"
},
{
"name": "cov_callsite_link",
"type": "statement"
},
{
"name": "cov_color",
"type": "statement"
},
{
"name": "cov_ct_idx",
"type": "statement"
},
{
"name": "cov_forward_reds",
"type": "statement"
},
{
"name... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
10 | 0 | 2,668 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | random | cov_callsite_link | true | statement | 17 | 17 | false | true | [
"cov_link",
"depth",
"cov_color",
"cov_ct_idx",
"cov_callsite_link",
"children",
"cov_forward_reds",
"cov_hitcount",
"cov_largest_blocked_func",
"cov_parent",
"dst_function_name",
"dst_function_source_file",
"hitcount",
"parent_calltree_callsite",
"src_function_name",
"src_function_sou... | [
{
"name": "children",
"type": "statement"
},
{
"name": "cov_callsite_link",
"type": "statement"
},
{
"name": "cov_color",
"type": "statement"
},
{
"name": "cov_ct_idx",
"type": "statement"
},
{
"name": "cov_forward_reds",
"type": "statement"
},
{
"name... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
11 | 0 | 2,710 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | Unknown | cov_link | true | statement | 17 | 17 | false | true | [
"cov_callsite_link",
"depth",
"cov_color",
"cov_ct_idx",
"cov_forward_reds",
"children",
"cov_hitcount",
"cov_largest_blocked_func",
"cov_link",
"cov_parent",
"dst_function_name",
"dst_function_source_file",
"hitcount",
"parent_calltree_callsite",
"src_function_name",
"src_function_sou... | [
{
"name": "children",
"type": "statement"
},
{
"name": "cov_callsite_link",
"type": "statement"
},
{
"name": "cov_color",
"type": "statement"
},
{
"name": "cov_ct_idx",
"type": "statement"
},
{
"name": "cov_forward_reds",
"type": "statement"
},
{
"name... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
12 | 0 | 2,749 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | infile | create_str_node_ctx_idx | true | function | 7 | 7 | false | true | [
"create_str_node_ctx_idx",
"get_fuzz_blockers",
"name",
"create_fuzz_blocker_table",
"html_create_dedicated_calltree_file",
"__init__",
"analysis_func",
"create_calltree",
"__annotations__",
"__class__",
"__delattr__",
"__dict__",
"__dir__",
"__eq__",
"__format__",
"__getattribute__",
... | [
{
"name": "analysis_func",
"type": "function"
},
{
"name": "create_calltree",
"type": "function"
},
{
"name": "create_fuzz_blocker_table",
"type": "function"
},
{
"name": "create_str_node_ctx_idx",
"type": "function"
},
{
"name": "get_fuzz_blockers",
"type": "... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
13 | 0 | 2,782 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | infile | cov_ct_idx | true | statement | 17 | 17 | false | true | [
"cov_ct_idx",
"depth",
"dst_function_name",
"cov_forward_reds",
"cov_link",
"children",
"cov_callsite_link",
"cov_color",
"cov_hitcount",
"cov_largest_blocked_func",
"cov_parent",
"dst_function_source_file",
"hitcount",
"parent_calltree_callsite",
"src_function_name",
"src_function_sou... | [
{
"name": "children",
"type": "statement"
},
{
"name": "cov_callsite_link",
"type": "statement"
},
{
"name": "cov_color",
"type": "statement"
},
{
"name": "cov_ct_idx",
"type": "statement"
},
{
"name": "cov_forward_reds",
"type": "statement"
},
{
"name... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
14 | 0 | 2,907 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | Unknown | dst_function_source_file | true | statement | 17 | 17 | false | true | [
"depth",
"cov_ct_idx",
"cov_link",
"cov_color",
"cov_callsite_link",
"children",
"cov_forward_reds",
"cov_hitcount",
"cov_largest_blocked_func",
"cov_parent",
"dst_function_name",
"dst_function_source_file",
"hitcount",
"parent_calltree_callsite",
"src_function_name",
"src_function_sou... | [
{
"name": "children",
"type": "statement"
},
{
"name": "cov_callsite_link",
"type": "statement"
},
{
"name": "cov_color",
"type": "statement"
},
{
"name": "cov_ct_idx",
"type": "statement"
},
{
"name": "cov_forward_reds",
"type": "statement"
},
{
"name... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
15 | 0 | 3,174 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | Unknown | depth | true | statement | 17 | 17 | false | true | [
"depth",
"cov_ct_idx",
"cov_link",
"cov_color",
"cov_forward_reds",
"children",
"cov_callsite_link",
"cov_hitcount",
"cov_largest_blocked_func",
"cov_parent",
"dst_function_name",
"dst_function_source_file",
"hitcount",
"parent_calltree_callsite",
"src_function_name",
"src_function_sou... | [
{
"name": "children",
"type": "statement"
},
{
"name": "cov_callsite_link",
"type": "statement"
},
{
"name": "cov_color",
"type": "statement"
},
{
"name": "cov_ct_idx",
"type": "statement"
},
{
"name": "cov_forward_reds",
"type": "statement"
},
{
"name... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
16 | 0 | 3,188 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | Unknown | depth | true | statement | 17 | 17 | false | false | [
"depth",
"cov_ct_idx",
"cov_link",
"cov_color",
"cov_forward_reds",
"children",
"cov_callsite_link",
"cov_hitcount",
"cov_largest_blocked_func",
"cov_parent",
"dst_function_name",
"dst_function_source_file",
"hitcount",
"parent_calltree_callsite",
"src_function_name",
"src_function_sou... | [
{
"name": "children",
"type": "statement"
},
{
"name": "cov_callsite_link",
"type": "statement"
},
{
"name": "cov_color",
"type": "statement"
},
{
"name": "cov_ct_idx",
"type": "statement"
},
{
"name": "cov_forward_reds",
"type": "statement"
},
{
"name... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
17 | 0 | 3,291 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | Unknown | depth | true | statement | 17 | 17 | false | false | [
"depth",
"cov_ct_idx",
"cov_link",
"cov_color",
"cov_callsite_link",
"children",
"cov_forward_reds",
"cov_hitcount",
"cov_largest_blocked_func",
"cov_parent",
"dst_function_name",
"dst_function_source_file",
"hitcount",
"parent_calltree_callsite",
"src_function_name",
"src_function_sou... | [
{
"name": "children",
"type": "statement"
},
{
"name": "cov_callsite_link",
"type": "statement"
},
{
"name": "cov_color",
"type": "statement"
},
{
"name": "cov_ct_idx",
"type": "statement"
},
{
"name": "cov_forward_reds",
"type": "statement"
},
{
"name... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
18 | 0 | 3,304 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | Unknown | depth | true | statement | 17 | 17 | false | false | [
"depth",
"cov_ct_idx",
"cov_link",
"cov_color",
"cov_forward_reds",
"children",
"cov_callsite_link",
"cov_hitcount",
"cov_largest_blocked_func",
"cov_parent",
"dst_function_name",
"dst_function_source_file",
"hitcount",
"parent_calltree_callsite",
"src_function_name",
"src_function_sou... | [
{
"name": "children",
"type": "statement"
},
{
"name": "cov_callsite_link",
"type": "statement"
},
{
"name": "cov_color",
"type": "statement"
},
{
"name": "cov_ct_idx",
"type": "statement"
},
{
"name": "cov_forward_reds",
"type": "statement"
},
{
"name... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
19 | 0 | 3,744 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | Unknown | depth | true | statement | 17 | 17 | false | false | [
"depth",
"cov_ct_idx",
"cov_link",
"cov_color",
"cov_forward_reds",
"children",
"cov_callsite_link",
"cov_hitcount",
"cov_largest_blocked_func",
"cov_parent",
"dst_function_name",
"dst_function_source_file",
"hitcount",
"parent_calltree_callsite",
"src_function_name",
"src_function_sou... | [
{
"name": "children",
"type": "statement"
},
{
"name": "cov_callsite_link",
"type": "statement"
},
{
"name": "cov_color",
"type": "statement"
},
{
"name": "cov_ct_idx",
"type": "statement"
},
{
"name": "cov_forward_reds",
"type": "statement"
},
{
"name... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
20 | 0 | 4,254 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | Unknown | depth | true | statement | 17 | 17 | false | false | [
"depth",
"cov_ct_idx",
"cov_link",
"cov_color",
"cov_callsite_link",
"children",
"cov_forward_reds",
"cov_hitcount",
"cov_largest_blocked_func",
"cov_parent",
"dst_function_name",
"dst_function_source_file",
"hitcount",
"parent_calltree_callsite",
"src_function_name",
"src_function_sou... | [
{
"name": "children",
"type": "statement"
},
{
"name": "cov_callsite_link",
"type": "statement"
},
{
"name": "cov_color",
"type": "statement"
},
{
"name": "cov_ct_idx",
"type": "statement"
},
{
"name": "cov_forward_reds",
"type": "statement"
},
{
"name... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
28 | 0 | 5,388 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | inproject | FuzzerProfile | true | class | 14 | 19 | false | false | [
"FuzzerProfile",
"MergedProjectProfile",
"None",
"List",
"logger",
"add_func_to_reached_and_clone",
"FunctionProfile",
"load_all_profiles",
"read_fuzzer_data_file_to_profile",
"Any",
"Dict",
"Optional",
"Set",
"Tuple"
] | [
{
"name": "add_func_to_reached_and_clone",
"type": "function"
},
{
"name": "Any",
"type": "class"
},
{
"name": "copy",
"type": "module"
},
{
"name": "Dict",
"type": "class"
},
{
"name": "FunctionProfile",
"type": "class"
},
{
"name": "fuzz_cfg_load",
... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
29 | 0 | 5,761 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | inproject | html_get_header | true | function | 9 | 9 | false | true | [
"html_create_table_head",
"html_table_add_row",
"html_get_header",
"html_get_navbar",
"List",
"html_add_header_with_link",
"html_get_table_of_contents",
"Any",
"Tuple"
] | [
{
"name": "Any",
"type": "class"
},
{
"name": "html_add_header_with_link",
"type": "function"
},
{
"name": "html_create_table_head",
"type": "function"
},
{
"name": "html_get_header",
"type": "function"
},
{
"name": "html_get_navbar",
"type": "function"
},
... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
31 | 0 | 6,077 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | Unknown | get_fuzz_blockers | true | function | 7 | 7 | false | true | [
"get_fuzz_blockers",
"create_fuzz_blocker_table",
"name",
"create_str_node_ctx_idx",
"html_create_dedicated_calltree_file",
"__init__",
"analysis_func",
"create_calltree",
"__annotations__",
"__class__",
"__delattr__",
"__dict__",
"__dir__",
"__eq__",
"__format__",
"__getattribute__",
... | [
{
"name": "analysis_func",
"type": "function"
},
{
"name": "create_calltree",
"type": "function"
},
{
"name": "create_fuzz_blocker_table",
"type": "function"
},
{
"name": "create_str_node_ctx_idx",
"type": "function"
},
{
"name": "get_fuzz_blockers",
"type": "... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
32 | 0 | 6,201 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | infile | create_fuzz_blocker_table | true | function | 7 | 7 | false | true | [
"get_fuzz_blockers",
"name",
"create_fuzz_blocker_table",
"create_str_node_ctx_idx",
"html_create_dedicated_calltree_file",
"__init__",
"analysis_func",
"create_calltree",
"__annotations__",
"__class__",
"__delattr__",
"__dict__",
"__dir__",
"__eq__",
"__format__",
"__getattribute__",
... | [
{
"name": "analysis_func",
"type": "function"
},
{
"name": "create_calltree",
"type": "function"
},
{
"name": "create_fuzz_blocker_table",
"type": "function"
},
{
"name": "create_str_node_ctx_idx",
"type": "function"
},
{
"name": "get_fuzz_blockers",
"type": "... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
33 | 0 | 6,814 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | infile | create_str_node_ctx_idx | true | function | 7 | 7 | false | false | [
"get_fuzz_blockers",
"name",
"create_fuzz_blocker_table",
"create_str_node_ctx_idx",
"create_calltree",
"__init__",
"analysis_func",
"html_create_dedicated_calltree_file",
"__annotations__",
"__class__",
"__delattr__",
"__dict__",
"__dir__",
"__eq__",
"__format__",
"__getattribute__",
... | [
{
"name": "analysis_func",
"type": "function"
},
{
"name": "create_calltree",
"type": "function"
},
{
"name": "create_fuzz_blocker_table",
"type": "function"
},
{
"name": "create_str_node_ctx_idx",
"type": "function"
},
{
"name": "get_fuzz_blockers",
"type": "... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
34 | 0 | 6,847 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | infile | cov_ct_idx | true | statement | 17 | 17 | false | false | [
"cov_ct_idx",
"depth",
"cov_forward_reds",
"dst_function_name",
"dst_function_source_file",
"children",
"cov_callsite_link",
"cov_color",
"cov_hitcount",
"cov_largest_blocked_func",
"cov_link",
"cov_parent",
"hitcount",
"parent_calltree_callsite",
"src_function_name",
"src_function_sou... | [
{
"name": "children",
"type": "statement"
},
{
"name": "cov_callsite_link",
"type": "statement"
},
{
"name": "cov_color",
"type": "statement"
},
{
"name": "cov_ct_idx",
"type": "statement"
},
{
"name": "cov_forward_reds",
"type": "statement"
},
{
"name... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
35 | 0 | 7,754 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | inproject | FuzzerProfile | true | class | 14 | 19 | false | false | [
"FuzzerProfile",
"MergedProjectProfile",
"List",
"None",
"logger",
"add_func_to_reached_and_clone",
"FunctionProfile",
"load_all_profiles",
"read_fuzzer_data_file_to_profile",
"Any",
"Dict",
"Optional",
"Set",
"Tuple"
] | [
{
"name": "add_func_to_reached_and_clone",
"type": "function"
},
{
"name": "Any",
"type": "class"
},
{
"name": "copy",
"type": "module"
},
{
"name": "Dict",
"type": "class"
},
{
"name": "FunctionProfile",
"type": "class"
},
{
"name": "fuzz_cfg_load",
... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
36 | 0 | 7,895 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | inproject | CalltreeCallsite | true | class | 9 | 9 | false | true | [
"extract_all_callsites",
"List",
"None",
"logger",
"Optional",
"CalltreeCallsite",
"data_file_read_calltree",
"extract_all_callsites_recursive",
"print_ctcs_tree"
] | [
{
"name": "CalltreeCallsite",
"type": "class"
},
{
"name": "data_file_read_calltree",
"type": "function"
},
{
"name": "extract_all_callsites",
"type": "function"
},
{
"name": "extract_all_callsites_recursive",
"type": "function"
},
{
"name": "List",
"type": "c... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
37 | 0 | 8,028 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | inproject | extract_all_callsites | true | function | 8 | 9 | false | false | [
"extract_all_callsites",
"CalltreeCallsite",
"List",
"logger",
"extract_all_callsites_recursive",
"data_file_read_calltree",
"print_ctcs_tree",
"Optional"
] | [
{
"name": "CalltreeCallsite",
"type": "class"
},
{
"name": "data_file_read_calltree",
"type": "function"
},
{
"name": "extract_all_callsites",
"type": "function"
},
{
"name": "extract_all_callsites_recursive",
"type": "function"
},
{
"name": "List",
"type": "c... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
39 | 0 | 8,501 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | Unknown | cov_forward_reds | true | statement | 17 | 17 | false | true | [
"depth",
"cov_ct_idx",
"dst_function_source_file",
"cov_forward_reds",
"cov_callsite_link",
"children",
"cov_color",
"cov_hitcount",
"cov_largest_blocked_func",
"cov_link",
"cov_parent",
"dst_function_name",
"hitcount",
"parent_calltree_callsite",
"src_function_name",
"src_function_sou... | [
{
"name": "children",
"type": "statement"
},
{
"name": "cov_callsite_link",
"type": "statement"
},
{
"name": "cov_color",
"type": "statement"
},
{
"name": "cov_ct_idx",
"type": "statement"
},
{
"name": "cov_forward_reds",
"type": "statement"
},
{
"name... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
40 | 0 | 8,752 | ossf__fuzz-introspector | 4867924b714a7789f94fbcde53713a29ceab7272 | post-processing/analyses/fuzz_calltree_analysis.py | Unknown | FuzzerProfile | true | class | 14 | 19 | false | false | [
"FuzzerProfile",
"MergedProjectProfile",
"logger",
"List",
"None",
"add_func_to_reached_and_clone",
"FunctionProfile",
"load_all_profiles",
"read_fuzzer_data_file_to_profile",
"Any",
"Dict",
"Optional",
"Set",
"Tuple"
] | [
{
"name": "add_func_to_reached_and_clone",
"type": "function"
},
{
"name": "Any",
"type": "class"
},
{
"name": "copy",
"type": "module"
},
{
"name": "Dict",
"type": "class"
},
{
"name": "FunctionProfile",
"type": "class"
},
{
"name": "fuzz_cfg_load",
... | # Copyright 2022 Fuzz Introspector Authors
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed ... |
π§ LCA-Starting Points
A benchmark for evaluating project-local code completion ranking. Curated to validate TreeRanker (ASE2025).
π Dataset Description
Starting Points is a specialized dataset designed to evaluate code completion ranking, with a specific focus on locally defined identifiers (project-specific APIs) in Python.
Most LLM benchmarks focus on global APIs (standard libraries). However, developers spend significant time using APIs defined within their own projects. Starting Points targets this "blind spot" by testing how well models can resolve and rank identifiers that are defined within the user's current repository but may not be visible in the immediate file context.
This dataset is a refined subset of the Long Code Arena, enriched with:
- Static Analysis Data: Valid completions resolved by the Jedi library.
- Real-World IDE Suggestions: Ranked candidate lists generated by IntelliJ IDEA.
β‘ Key Features
- Focus: Project-specific API completion (vs. standard library).
- Language: Python.
- Source: Large projects with rich user-defined classes and functions.
- Goal: Benchmark ranking algorithms for local development environments.
π Dataset Structure
Data Instances
Each instance represents a specific cursor position in a Python file where a dereference operation (e.g., object.) occurs. The task is to predict the correct next identifier from a list of candidates.
π Data Fields
This dataset includes rich metadata to facilitate deep analysis of ranking performance, surpassing the original details in the paper.
| Field | Type | Description |
|---|---|---|
idx |
int64 |
Unique identifier for the dataset entry. |
idx_lca |
int64 |
Original index of the file in the Long Code Arena benchmark. |
repo |
string |
Name of the source repository. |
commit_hash |
string |
Specific commit hash used for the snapshot. |
target_file |
string |
Path to the file within the repository. |
offset |
int64 |
Character offset (cursor position) where completion is triggered. |
prefix |
string |
Source code content preceding the cursor (the context). |
ground_truth |
string |
The actual identifier the developer typed (target label). |
completion_type |
string |
Metadata describing the completion scenario. |
start_with_ |
bool |
True if the ground truth starts with an underscore _. |
first_occurrence |
bool |
True if the identifier has not appeared previously in the prefix (file context). Useful for evaluating "unseen" identifier performance. |
in_completions |
bool |
True if ground_truth is present in the intellij_completions list. |
intellij_completions |
sequence[string] |
Ranked list of candidates from IntelliJ IDEA's completion engine. |
jedi_completions |
list[struct] |
List of valid completions from Jedi, including name and type. |
non_dunder_count_intellij |
int64 |
Count of IntelliJ candidates excluding dunder methods (e.g., __init__). |
non_dunder_count_jedi |
int64 |
Count of Jedi candidates excluding dunder methods. |
line_type_lca |
string |
Inherited metadata from Long Code Arena regarding line classification. |
π οΈ Dataset Creation
Curation Rationale
Standard benchmarks often overlook the difficulty of ranking identifiers that are local to a specific project. This dataset was created to test model performance in this realistic, everyday scenario where context from other files in the repository is crucial.
Source Data
- Origin: Long Code Arena benchmark.
- Filtering:
- Dereference Detection: Uses
tree-sitterto find.operators. - Static Analysis: Uses
Jedito resolve object types. - Scope Constraint: Retains only suggestions defined within the same repository, excluding standard library calls.
- Quality Control: Requires the ground truth to be in the IntelliJ candidate list and the list to have at least 5 non-trivial items.
- Dereference Detection: Uses
π Citation
If you use this dataset, please cite the original paper:
@article{cipollone2025treeranker,
title={TreeRanker: Fast and Model-agnostic Ranking System for Code Suggestions in IDEs},
author={Cipollone, Daniele and Bogomolov, Egor and van Deursen, Arie and Izadi, Maliheh},
journal={arXiv preprint arXiv:2508.02455},
year={2025}
}
- Downloads last month
- 15