diff --git a/docs/fuzzers/field-fuzzers/abugidas-in-string-fields.md b/docs/fuzzers/field-fuzzers/abugidas-in-string-fields.md
index 78908781e..43e365959 100644
--- a/docs/fuzzers/field-fuzzers/abugidas-in-string-fields.md
+++ b/docs/fuzzers/field-fuzzers/abugidas-in-string-fields.md
@@ -10,7 +10,7 @@ This Fuzzer has 2 flavours depending on the `--sanitizationStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | AbugidasInStringFieldsSanitizeValidateFuzzer |
-| **Log Key** | **AISFH** |
+| **Log Key** | **AISF** |
| **Description** | This fuzzer inserts [abugida](https://en.wikipedia.org/wiki/Abugida) characters (జ్ఞా and স্রু) in valid values. The expectation is that APIs will sanitize the `\u200c` character and leave only the `జ్ఞ` and `ా`. |
| **Enabled by default?** | Yes |
| **Target field types** | OpenAPI type `string` |
@@ -27,7 +27,7 @@ This Fuzzer has 2 flavours depending on the `--sanitizationStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | AbugidasInStringFieldsValidateSanitizeFuzzer |
-| **Log Key** | **AISFH** |
+| **Log Key** | **AISF** |
| **Description** | This fuzzer inserts [abugida](https://en.wikipedia.org/wiki/Abugida) characters (జ్ఞా and স্রু) in valid values. As the sanitization is assumed post-validation, the expectation is that APIs reject the request as invalid. |
| **Enabled by default?** | Yes |
| **Target field types** | OpenAPI type `string` |
diff --git a/docs/fuzzers/field-fuzzers/decimal-fields-left-boundary.md b/docs/fuzzers/field-fuzzers/decimal-fields-left-boundary.md
index 77ea8e567..7f3a5a814 100644
--- a/docs/fuzzers/field-fuzzers/decimal-fields-left-boundary.md
+++ b/docs/fuzzers/field-fuzzers/decimal-fields-left-boundary.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | DecimalFieldsLeftBoundaryFuzzer |
-| **Log Key** | **DFLBF** |
+| **Log Key** | **DFLB** |
| **Description** | This fuzzer will send left boundary values in decimal fields. The expectation is that APIs will reject the request as invalid, as the value is lower than it's minimum. |
| **Enabled by default?** | Yes |
| **Target field types** | OpenAPI type `number` |
diff --git a/docs/fuzzers/field-fuzzers/decimal-fields-right-boundary.md b/docs/fuzzers/field-fuzzers/decimal-fields-right-boundary.md
index f83373e49..3747f2a69 100644
--- a/docs/fuzzers/field-fuzzers/decimal-fields-right-boundary.md
+++ b/docs/fuzzers/field-fuzzers/decimal-fields-right-boundary.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | DecimalFieldsRightBoundaryFuzzer |
-| **Log Key** | **DFRBF** |
+| **Log Key** | **DFRB** |
| **Description** | This fuzzer will send right boundary values in decimal fields. The expectation is that APIs will reject the request as invalid, as the value is higher than it's maximum. |
| **Enabled by default?** | Yes |
| **Target field types** | OpenAPI type `number` |
diff --git a/docs/fuzzers/field-fuzzers/decimals-in-integers.md b/docs/fuzzers/field-fuzzers/decimals-in-integers.md
index 83023cd1b..6457d7144 100644
--- a/docs/fuzzers/field-fuzzers/decimals-in-integers.md
+++ b/docs/fuzzers/field-fuzzers/decimals-in-integers.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | DecimalNumbersInIntegerFieldsFuzzer |
-| **Log Key** | **DNIIFF** |
+| **Log Key** | **DNIIF** |
| **Description** | This fuzzer will send decimal values in integer fields. The expectation is that APIs will reject the request as invalid, rather than rounding it. |
| **Enabled by default?** | Yes |
| **Target field types** | OpenAPI type `integer` |
diff --git a/docs/fuzzers/field-fuzzers/default-values.md b/docs/fuzzers/field-fuzzers/default-values.md
index 6e439c0f7..5e07a1549 100644
--- a/docs/fuzzers/field-fuzzers/default-values.md
+++ b/docs/fuzzers/field-fuzzers/default-values.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | DefaultValuesInFieldsFuzzer |
-| **Log Key** | **DVIFF** |
+| **Log Key** | **DVIF** |
| **Description** | This fuzzer will send default values for fields, if defined in the OpenAPI specs. The expectation is that APIs treat these requests as happy path. The fuzzer aims to check that the default values defined in the OpenAPI specs are working as expected. |
| **Enabled by default?** | Yes |
| **Target field types** | All fields |
diff --git a/docs/fuzzers/field-fuzzers/empty-strings.md b/docs/fuzzers/field-fuzzers/empty-strings.md
index 3ff243d5f..aee9cefac 100644
--- a/docs/fuzzers/field-fuzzers/empty-strings.md
+++ b/docs/fuzzers/field-fuzzers/empty-strings.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | EmptyStringsInFieldsFuzzer |
-| **Log Key** | **ESIFF** |
+| **Log Key** | **ESIF** |
| **Description** | This fuzzer will send empty values in fields. The expectation is that APIs will reject the request as invalid for required fields. |
| **Enabled by default?** | Yes |
| **Target field types** | All fields |
diff --git a/docs/fuzzers/field-fuzzers/examples-fields.md b/docs/fuzzers/field-fuzzers/examples-fields.md
index 7c71b737e..62e72e90b 100644
--- a/docs/fuzzers/field-fuzzers/examples-fields.md
+++ b/docs/fuzzers/field-fuzzers/examples-fields.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | ExamplesFieldsFuzzer |
-| **Log Key** | **EFF** |
+| **Log Key** | **EF** |
| **Description** | This fuzzer will send full request examples as defined in the OpenAPI specs. The expectation is that APIs will treat these requests as happy path. The fuzzer aims to check that all examples defined in the OpenAPI specs are correct and in-line with the request schemas. |
| **Enabled by default?** | Yes |
| **Target field types** | N/A |
diff --git a/docs/fuzzers/field-fuzzers/extreme-negative-decimal.md b/docs/fuzzers/field-fuzzers/extreme-negative-decimal.md
index ec18f51cb..c9bcfbcde 100644
--- a/docs/fuzzers/field-fuzzers/extreme-negative-decimal.md
+++ b/docs/fuzzers/field-fuzzers/extreme-negative-decimal.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | ExtremeNegativeNumbersInDecimalFieldsFuzzer |
-| **Log Key** | **ENNIDFF** |
+| **Log Key** | **ENNIDF** |
| **Description** | This fuzzer will send outside the range values in decimal fields. The expectation is that APIs will reject the request as invalid as they might potentially break downstream systems. Furthermore, APIs should update their specs to define clear boundaries (`minimum`, `maximum`) for these fields. |
| **Enabled by default?** | Yes |
| **Target field types** | OpenAPI type `number` |
diff --git a/docs/fuzzers/field-fuzzers/extreme-negative-integer.md b/docs/fuzzers/field-fuzzers/extreme-negative-integer.md
index db910acad..fd31f01fc 100644
--- a/docs/fuzzers/field-fuzzers/extreme-negative-integer.md
+++ b/docs/fuzzers/field-fuzzers/extreme-negative-integer.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | ExtremeNegativeNumbersInIntegerFieldsFuzzer |
-| **Log Key** | **ENNIIFF** |
+| **Log Key** | **ENNIIF** |
| **Description** | This fuzzer will send outside the range values in integer fields. The expectation is that APIs will reject the request as invalid as they might potentially break downstream systems. Furthermore, APIs should update their specs to define clear boundaries (`minimum`, `maximum`) for these fields. |
| **Enabled by default?** | Yes |
| **Target field types** | OpenAPI type `integer` |
diff --git a/docs/fuzzers/field-fuzzers/extreme-positive-decimal.md b/docs/fuzzers/field-fuzzers/extreme-positive-decimal.md
index 242680d23..09dfcdb65 100644
--- a/docs/fuzzers/field-fuzzers/extreme-positive-decimal.md
+++ b/docs/fuzzers/field-fuzzers/extreme-positive-decimal.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | ExtremePositiveNumbersInDecimalFieldsFuzzer |
-| **Log Key** | **EPNIDFF** |
+| **Log Key** | **EPNIDF** |
| **Description** | This fuzzer will send outside the range values in decimal fields. The expectation is that APIs will reject the request as invalid as they might potentially break downstream systems. Furthermore, APIs should update their specs to define clear boundaries (`minimum`, `maximum`) for these fields. |
| **Enabled by default?** | Yes |
| **Target field types** | OpenAPI type `number` |
diff --git a/docs/fuzzers/field-fuzzers/extreme-positive-integer.md b/docs/fuzzers/field-fuzzers/extreme-positive-integer.md
index f64a8fba8..57faf1b93 100644
--- a/docs/fuzzers/field-fuzzers/extreme-positive-integer.md
+++ b/docs/fuzzers/field-fuzzers/extreme-positive-integer.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | ExtremePositiveNumbersInIntegerFieldsFuzzer |
-| **Log Key** | **EPNIIFF** |
+| **Log Key** | **EPNIIF** |
| **Description** | This fuzzer will send outside the range values in integer fields. The expectation is that APIs will reject the request as invalid as they might potentially break downstream systems. Furthermore, APIs should update their specs to define clear boundaries (`minimum`, `maximum`) for these fields. |
| **Enabled by default?** | Yes |
| **Target field types** | OpenAPI type `integer` |
diff --git a/docs/fuzzers/field-fuzzers/integer-fields-left-boundary.md b/docs/fuzzers/field-fuzzers/integer-fields-left-boundary.md
index 6f62d187d..64e94a2e6 100644
--- a/docs/fuzzers/field-fuzzers/integer-fields-left-boundary.md
+++ b/docs/fuzzers/field-fuzzers/integer-fields-left-boundary.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | IntegerFieldsLeftBoundaryFuzzer |
-| **Log Key** | **IFLBF** |
+| **Log Key** | **IFLB** |
| **Description** | This fuzzer will send left boundary values in integer fields. The expectation is that APIs will reject the request as invalid, as the value is lower than it's minimum. |
| **Enabled by default?** | Yes |
| **Target field types** | OpenAPI type `integer` |
diff --git a/docs/fuzzers/field-fuzzers/integer-fields-right-boundary.md b/docs/fuzzers/field-fuzzers/integer-fields-right-boundary.md
index bbce8f07c..35a62c34f 100644
--- a/docs/fuzzers/field-fuzzers/integer-fields-right-boundary.md
+++ b/docs/fuzzers/field-fuzzers/integer-fields-right-boundary.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | IntegerFieldsRightBoundaryFuzzer |
-| **Log Key** | **IFRBF** |
+| **Log Key** | **IFRB** |
| **Description** | This fuzzer will send right boundary values in integer fields. The expectation is that APIs will reject the request as invalid, as the value is higher than it's maximum. |
| **Enabled by default?** | Yes |
| **Target field types** | OpenAPI type `integer` |
diff --git a/docs/fuzzers/field-fuzzers/invalid-values-enums.md b/docs/fuzzers/field-fuzzers/invalid-values-enums.md
index 03b47bad8..28740d924 100644
--- a/docs/fuzzers/field-fuzzers/invalid-values-enums.md
+++ b/docs/fuzzers/field-fuzzers/invalid-values-enums.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | InvalidValuesInEnumsFieldsFuzzer |
-| **Log Key** | **IVIEFF** |
+| **Log Key** | **IVIEF** |
| **Description** | This fuzzer will send invalid values in enum fields. The expectation is that APIs will reject the request as invalid, rather than implicitly defaulting to an enum value. |
| **Enabled by default?** | Yes |
| **Target field types** | OpenAPI type `string` |
diff --git a/docs/fuzzers/field-fuzzers/iterate-though-enums.md b/docs/fuzzers/field-fuzzers/iterate-though-enums.md
index 8377d893c..71c053bbb 100644
--- a/docs/fuzzers/field-fuzzers/iterate-though-enums.md
+++ b/docs/fuzzers/field-fuzzers/iterate-though-enums.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | IterateThroughEnumValuesFieldsFuzzer |
-| **Log Key** | **ITEVFF** |
+| **Log Key** | **ITEVF** |
| **Description** | This fuzzer will iterate through all possible values of enums. The expectation is that APIs will treat the requests as happy paths. |
| **Enabled by default?** | Yes |
| **Target field types** | OpenAPI type `string` |
diff --git a/docs/fuzzers/field-fuzzers/leading-control-chars.md b/docs/fuzzers/field-fuzzers/leading-control-chars.md
index 9a9a2d6fd..97d1f7dc5 100644
--- a/docs/fuzzers/field-fuzzers/leading-control-chars.md
+++ b/docs/fuzzers/field-fuzzers/leading-control-chars.md
@@ -10,7 +10,7 @@ This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | LeadingControlCharsInFieldsTrimValidateFuzzer |
-| **Log Key** | **LCCIFF** |
+| **Log Key** | **LCCIF** |
| **Description** | This fuzzer prefixes fields with [unicode control characters](https://en.wikipedia.org/wiki/Control_character). The expectation is that APIs will sanitize the input values, thus removing control characters and handle the request as a happy path. |
| **Enabled by default?** | No. You need to supply `--includeControlChars` argument |
| **Target field types** | All |
@@ -26,7 +26,7 @@ This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | LeadingControlCharsInFieldsValidateTrimFuzzer |
-| **Log Key** | **LCCIFF** |
+| **Log Key** | **LCCIF** |
| **Description** | This fuzzer prefixes fields with [unicode control characters](https://en.wikipedia.org/wiki/Control_character). As the sanitization is assumed post-validation, the expectation is that APIs reject the request as invalid. |
| **Enabled by default?** | No. You need to supply `--includeControlChars` argument |
| **Target field types** | All |
diff --git a/docs/fuzzers/field-fuzzers/leading-multi-codepoint-emojis.md b/docs/fuzzers/field-fuzzers/leading-multi-codepoint-emojis.md
index b9edd777a..f01ac1941 100644
--- a/docs/fuzzers/field-fuzzers/leading-multi-codepoint-emojis.md
+++ b/docs/fuzzers/field-fuzzers/leading-multi-codepoint-emojis.md
@@ -10,7 +10,7 @@ This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | LeadingMultiCodePointEmojisInFieldsTrimValidateFuzzer |
-| **Log Key** | **LMCPEIFF** |
+| **Log Key** | **LMCPEIF** |
| **Description** | This fuzzer prefixes fields with multi-codepoint emojis. The expectation is that APIs will sanitize the input values, thus removing emojis and handle the request as a happy path. |
| **Enabled by default?** | No. You need to supply `--includeEmojis` argument |
| **Target field types** | All |
@@ -26,7 +26,7 @@ This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | LeadingMultiCodePointEmojisInFieldsTrimValidateFuzzer |
-| **Log Key** | **LMCPEIFF** |
+| **Log Key** | **LMCPEIF** |
| **Description** | This fuzzer prefixes fields with multi-codepoint emojis. As the sanitization is assumed post-validation, the expectation is that APIs reject the request as invalid. |
| **Enabled by default?** | No. You need to supply `--includeEmojis` argument |
| **Target field types** | All |
diff --git a/docs/fuzzers/field-fuzzers/leading-single-codepoint-emojis.md b/docs/fuzzers/field-fuzzers/leading-single-codepoint-emojis.md
index da5eb07ab..3a435a14e 100644
--- a/docs/fuzzers/field-fuzzers/leading-single-codepoint-emojis.md
+++ b/docs/fuzzers/field-fuzzers/leading-single-codepoint-emojis.md
@@ -10,7 +10,7 @@ This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | LeadingSingleCodePointEmojisInFieldsTrimValidateFuzzer |
-| **Log Key** | **LSCPEIFF** |
+| **Log Key** | **LSCPEIF** |
| **Description** | This fuzzer prefixes fields with single-codepoint emojis. The expectation is that APIs will sanitize the input values, thus removing emojis and handle the request as a happy path. |
| **Enabled by default?** | No. You need to supply `--includeEmojis` argument |
| **Target field types** | All |
@@ -26,7 +26,7 @@ This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | LeadingSingleCodePointEmojisInFieldsTrimValidateFuzzer |
-| **Log Key** | **LSCPEIFF** |
+| **Log Key** | **LSCPEIF** |
| **Description** | This fuzzer prefixes fields with single-codepoint emojis. As the sanitization is assumed post-validation, the expectation is that APIs reject the request as invalid. |
| **Enabled by default?** | No. You need to supply `--includeEmojis` argument |
| **Target field types** | All |
diff --git a/docs/fuzzers/field-fuzzers/leading-whitespaces.md b/docs/fuzzers/field-fuzzers/leading-whitespaces.md
index 2fe25afb0..5273a5e18 100644
--- a/docs/fuzzers/field-fuzzers/leading-whitespaces.md
+++ b/docs/fuzzers/field-fuzzers/leading-whitespaces.md
@@ -10,7 +10,7 @@ This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | LeadingWhitespacesInFieldsTrimValidateFuzzer |
-| **Log Key** | **LWIFF** |
+| **Log Key** | **LWIF** |
| **Description** | This fuzzer prefixes fields with [whitespaces](https://en.wikipedia.org/wiki/Whitespace_character). The expectation is that APIs will sanitize the input values, thus removing whitespaces and handle the request as a happy path. |
| **Enabled by default?** | No. You need to supply `--includeWhitespaces` argument |
| **Target field types** | All |
@@ -26,7 +26,7 @@ This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | LeadingWhitespacesInFieldsValidateTrimFuzzer |
-| **Log Key** | **LWIFF** |
+| **Log Key** | **LWIF** |
| **Description** | This fuzzer prefixes fields with [whitespaces](https://en.wikipedia.org/wiki/Whitespace_character). As the sanitization is assumed post-validation, the expectation is that APIs reject the request as invalid. |
| **Enabled by default?** | No. You need to supply `--includeWhitespaces` argument |
| **Target field types** | All |
diff --git a/docs/fuzzers/field-fuzzers/max-lenght-exact-values.md b/docs/fuzzers/field-fuzzers/max-lenght-exact-values.md
index 0d980b787..8d93997f7 100644
--- a/docs/fuzzers/field-fuzzers/max-lenght-exact-values.md
+++ b/docs/fuzzers/field-fuzzers/max-lenght-exact-values.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | MaxLengthExactValuesInStringFieldsFuzzer |
-| **Log Key** | **MLEVISFF** |
+| **Log Key** | **MLEVISF** |
| **Description** | This fuzzer will iterate through `string` fields and send values with length of `maxLength`(if present). The expectation is that APIs will treat the requests as happy paths. The Fuzzer aims to verify that all defined boundaries are properly implemented. |
| **Enabled by default?** | Yes |
| **Target field types** | OpenAPI type `string` |
diff --git a/docs/fuzzers/field-fuzzers/maximum-exact-numbers.md b/docs/fuzzers/field-fuzzers/maximum-exact-numbers.md
index 1e7865ee6..73b5ca2f1 100644
--- a/docs/fuzzers/field-fuzzers/maximum-exact-numbers.md
+++ b/docs/fuzzers/field-fuzzers/maximum-exact-numbers.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | MaximumExactNumbersInNumericFieldsFuzzer |
-| **Log Key** | **MENINFF** |
+| **Log Key** | **MENINF** |
| **Description** | This fuzzer will iterate through `number` and `integer` fields and send values defined in the `maximum`(if present). The expectation is that APIs will treat the requests as happy paths. The Fuzzer aims to verify that all defined boundaries are properly implemented. |
| **Enabled by default?** | Yes |
| **Target field types** | OpenAPI type `number` and `integer` |
diff --git a/docs/fuzzers/field-fuzzers/min-length-exact-values.md b/docs/fuzzers/field-fuzzers/min-length-exact-values.md
index 2652a2fcf..311961ff6 100644
--- a/docs/fuzzers/field-fuzzers/min-length-exact-values.md
+++ b/docs/fuzzers/field-fuzzers/min-length-exact-values.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | MinLengthExactValuesInStringFieldsFuzzer |
-| **Log Key** | **MLEVISFF** |
+| **Log Key** | **MLEVISF** |
| **Description** | This fuzzer will iterate through `string` fields and send values with length of `minLength`(if present). The expectation is that APIs will treat the requests as happy paths. The Fuzzer aims to verify that all defined boundaries are properly implemented. |
| **Enabled by default?** | Yes |
| **Target field types** | OpenAPI type `string` |
diff --git a/docs/fuzzers/field-fuzzers/minimum-exact-numbers.md b/docs/fuzzers/field-fuzzers/minimum-exact-numbers.md
index b05ae2d22..0867ef559 100644
--- a/docs/fuzzers/field-fuzzers/minimum-exact-numbers.md
+++ b/docs/fuzzers/field-fuzzers/minimum-exact-numbers.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | MinimumExactNumbersInNumericFieldsFuzzer |
-| **Log Key** | **MENINFF** |
+| **Log Key** | **MENINF** |
| **Description** | This fuzzer will iterate through `number` and `integer` fields and send values defined in the `minimum`(if present). The expectation is that APIs will treat the requests as happy paths. The Fuzzer aims to verify that all defined boundaries are properly implemented. |
| **Enabled by default?** | Yes |
| **Target field types** | OpenAPI type `number` and `integer` |
diff --git a/docs/fuzzers/field-fuzzers/new-fields-fuzzer.md b/docs/fuzzers/field-fuzzers/new-fields-fuzzer.md
index c79d2b372..54988e58b 100644
--- a/docs/fuzzers/field-fuzzers/new-fields-fuzzer.md
+++ b/docs/fuzzers/field-fuzzers/new-fields-fuzzer.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | NewFieldsFuzzer |
-| **Log Key** | **NFF** |
+| **Log Key** | **NF** |
| **Description** | This fuzzer will inject a new field in a valid payload. If the request is for a method with body, the injection will happen within the json body, otherwise the injection will happen as an additional query param. The expectation is that APIs will reject the requests with json bodies in order to prevent injection of random data. |
| **Enabled by default?** | Yes |
| **Target field types** | N/A |
diff --git a/docs/fuzzers/field-fuzzers/null-values-in-field.md b/docs/fuzzers/field-fuzzers/null-values-in-field.md
index ad39ec843..3bede6435 100644
--- a/docs/fuzzers/field-fuzzers/null-values-in-field.md
+++ b/docs/fuzzers/field-fuzzers/null-values-in-field.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | NullValuesInFieldsFuzzer |
-| **Log Key** | **NVIFF** |
+| **Log Key** | **NVIF** |
| **Description** | This fuzzer will send null values in fields. The expectation is that APIs will reject the request as invalid for required fields. |
| **Enabled by default?** | Yes |
| **Target field types** | All fields |
diff --git a/docs/fuzzers/field-fuzzers/only-control-chars.md b/docs/fuzzers/field-fuzzers/only-control-chars.md
index 8be5cb80e..273c7e0b0 100644
--- a/docs/fuzzers/field-fuzzers/only-control-chars.md
+++ b/docs/fuzzers/field-fuzzers/only-control-chars.md
@@ -10,7 +10,7 @@ This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | OnlyControlCharsInFieldsTrimValidateFuzzer |
-| **Log Key** | **OCCIFF** |
+| **Log Key** | **OCCIF** |
| **Description** | This fuzzer replaces fields with [unicode control characters](https://en.wikipedia.org/wiki/Control_character). The expectation is that APIs will sanitize the input values, thus removing control characters and handle the request as a happy path. |
| **Enabled by default?** | No. You need to supply `--includeControlChars` argument |
| **Target field types** | All |
@@ -26,7 +26,7 @@ This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | OnlyControlCharsInFieldsValidateTrimFuzzer |
-| **Log Key** | **OCCIFF** |
+| **Log Key** | **OCCIF** |
| **Description** | This fuzzer replaces fields with [unicode control characters](https://en.wikipedia.org/wiki/Control_character). As the sanitization is assumed post-validation, the expectation is that APIs reject the request as invalid. |
| **Enabled by default?** | No. You need to supply `--includeControlChars` argument |
| **Target field types** | All |
diff --git a/docs/fuzzers/field-fuzzers/only-multi-codepoint-emojis.md b/docs/fuzzers/field-fuzzers/only-multi-codepoint-emojis.md
index ab6f03d4f..9999df434 100644
--- a/docs/fuzzers/field-fuzzers/only-multi-codepoint-emojis.md
+++ b/docs/fuzzers/field-fuzzers/only-multi-codepoint-emojis.md
@@ -10,7 +10,7 @@ This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | OnlyMultiCodePointEmojisInFieldsTrimValidateFuzzer |
-| **Log Key** | **OMCPEIFF** |
+| **Log Key** | **OMCPEIF** |
| **Description** | This fuzzer replaces fields with multi-codepoint emojis. The expectation is that APIs will sanitize the input values, thus removing emojis and handle the request as a happy path. |
| **Enabled by default?** | No. You need to supply `--includeEmojis` argument |
| **Target field types** | All |
@@ -26,7 +26,7 @@ This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | OnlyMultiCodePointEmojisInFieldsValidateTrimFuzzer |
-| **Log Key** | **OMCPEIFF** |
+| **Log Key** | **OMCPEIF** |
| **Description** | This fuzzer replaces fields with multi-codepoint emojis. As the sanitization is assumed post-validation, the expectation is that APIs reject the request as invalid. |
| **Enabled by default?** | No. You need to supply `--includeEmojis` argument |
| **Target field types** | All |
diff --git a/docs/fuzzers/field-fuzzers/only-single-codepoint-emojis.md b/docs/fuzzers/field-fuzzers/only-single-codepoint-emojis.md
index b9b341306..c1f1ed760 100644
--- a/docs/fuzzers/field-fuzzers/only-single-codepoint-emojis.md
+++ b/docs/fuzzers/field-fuzzers/only-single-codepoint-emojis.md
@@ -10,7 +10,7 @@ This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | OnlySingleCodePointEmojisInFieldsTrimValidateFuzzer |
-| **Log Key** | **OSCPEIFF** |
+| **Log Key** | **OSCPEIF** |
| **Description** | This fuzzer replaces fields with single-codepoint emojis. The expectation is that APIs will sanitize the input values, thus removing emojis and handle the request as a happy path. |
| **Enabled by default?** | No. You need to supply `--includeEmojis` argument |
| **Target field types** | All |
@@ -26,7 +26,7 @@ This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | OnlySingleCodePointEmojisInFieldsValidateTrimFuzzer |
-| **Log Key** | **OSCPEIFF** |
+| **Log Key** | **OSCPEIF** |
| **Description** | This fuzzer replaces fields with single-codepoint emojis. As the sanitization is assumed post-validation, the expectation is that APIs reject the request as invalid. |
| **Enabled by default?** | No. You need to supply `--includeEmojis` argument |
| **Target field types** | All |
diff --git a/docs/fuzzers/field-fuzzers/only-whitespaces.md b/docs/fuzzers/field-fuzzers/only-whitespaces.md
index 6608181e5..b8cd2162e 100644
--- a/docs/fuzzers/field-fuzzers/only-whitespaces.md
+++ b/docs/fuzzers/field-fuzzers/only-whitespaces.md
@@ -10,7 +10,7 @@ This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | OnlyWhitespacesInFieldsTrimValidateFuzzer |
-| **Log Key** | **OWIFF** |
+| **Log Key** | **OWIF** |
| **Description** | This fuzzer replaces fields with [whitespaces](https://en.wikipedia.org/wiki/Whitespace_character). The expectation is that APIs will sanitize the input values, thus removing whitespaces and handle the request as a happy path. |
| **Enabled by default?** | No. You need to supply `--includeWhitespaces` argument |
| **Target field types** | All |
@@ -26,7 +26,7 @@ This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | OnlyWhitespacesInFieldsValidateTrimFuzzer |
-| **Log Key** | **OWIFF** |
+| **Log Key** | **OWIF** |
| **Description** | This fuzzer replaces fields with [whitespaces](https://en.wikipedia.org/wiki/Whitespace_character). As the sanitization is assumed post-validation, the expectation is that APIs reject the request as invalid. |
| **Enabled by default?** | No. You need to supply `--includeWhitespaces` argument |
| **Target field types** | All |
diff --git a/docs/fuzzers/field-fuzzers/overflow-array-size.md b/docs/fuzzers/field-fuzzers/overflow-array-size.md
index f98c6b0c1..3ce16d555 100644
--- a/docs/fuzzers/field-fuzzers/overflow-array-size.md
+++ b/docs/fuzzers/field-fuzzers/overflow-array-size.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | OverflowArraySizeFieldsFuzzer |
-| **Log Key** | **OASFF** |
+| **Log Key** | **OASF** |
| **Description** | This fuzzer will overflow the size of JSON arrays. The expectation is that APIs will reject the request as invalid. |
| **Enabled by default?** | Yes |
| **Target field types** | All array fields |
diff --git a/docs/fuzzers/field-fuzzers/overflow-map-size.md b/docs/fuzzers/field-fuzzers/overflow-map-size.md
index 3f8c2e602..f9698911b 100644
--- a/docs/fuzzers/field-fuzzers/overflow-map-size.md
+++ b/docs/fuzzers/field-fuzzers/overflow-map-size.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | OverflowMapSizeFieldsFuzzer |
-| **Log Key** | **OMSFF** |
+| **Log Key** | **OMSF** |
| **Description** | This fuzzer will overflow the size of OpenAPI map elements (i.e. elements that have `additionalProperties` defined). The expectation is that APIs will reject the request as invalid. |
| **Enabled by default?** | Yes |
| **Target field types** | All map fields |
diff --git a/docs/fuzzers/field-fuzzers/random-strings-booleans.md b/docs/fuzzers/field-fuzzers/random-strings-booleans.md
index 24388dbe5..903321231 100644
--- a/docs/fuzzers/field-fuzzers/random-strings-booleans.md
+++ b/docs/fuzzers/field-fuzzers/random-strings-booleans.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | RandomStringsInBooleanFieldsFuzzer |
-| **Log Key** | **RSIBFF** |
+| **Log Key** | **RSIBF** |
| **Description** | This fuzzer will replace boolean fields with a random string. The expectation is that APIs will reject the request as invalid, rather than defaulting boolean values to `false`. |
| **Enabled by default?** | Yes |
| **Target field types** | OpenAPI type `boolean` |
diff --git a/docs/fuzzers/field-fuzzers/remove-fields.md b/docs/fuzzers/field-fuzzers/remove-fields.md
index db1058ec0..23a76426e 100644
--- a/docs/fuzzers/field-fuzzers/remove-fields.md
+++ b/docs/fuzzers/field-fuzzers/remove-fields.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | RemoveFieldsFuzzer |
-| **Log Key** | **RFF** |
+| **Log Key** | **RF** |
| **Description** | This fuzzer will remove fields in different combinations. The number of all possible combinations is driven by the `--fieldsFuzzingStrategy` argument. The expectation is that if required fields are removed the APIs will reject the request as invalid. |
| **Enabled by default?** | Yes |
| **Target field types** | All |
diff --git a/docs/fuzzers/field-fuzzers/replace-arrays-with-primitives.md b/docs/fuzzers/field-fuzzers/replace-arrays-with-primitives.md
index d41fb26d4..829862bae 100644
--- a/docs/fuzzers/field-fuzzers/replace-arrays-with-primitives.md
+++ b/docs/fuzzers/field-fuzzers/replace-arrays-with-primitives.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | ReplaceArraysWithPrimitivesFieldsFuzzer |
-| **Log Key** | **RAWPFF** |
+| **Log Key** | **RAWPF** |
| **Description** | This fuzzer will replace JSON arrays with primitive values. The expectation is that APIs will reject the request as invalid. This Fuzzer won't replace reference data. |
| **Enabled by default?** | Yes |
| **Target field types** | All array fields |
diff --git a/docs/fuzzers/field-fuzzers/replace-arrays-with-simple-objects.md b/docs/fuzzers/field-fuzzers/replace-arrays-with-simple-objects.md
index c2e3fa3df..e94b51891 100644
--- a/docs/fuzzers/field-fuzzers/replace-arrays-with-simple-objects.md
+++ b/docs/fuzzers/field-fuzzers/replace-arrays-with-simple-objects.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | ReplaceArraysWithSimpleObjectsFieldsFuzzer |
-| **Log Key** | **RAWSOFF** |
+| **Log Key** | **RAWSOF** |
| **Description** | This fuzzer will replace JSON arrays with JSON objects. The expectation is that APIs will reject the request as invalid. This Fuzzer won't replace reference data. |
| **Enabled by default?** | Yes |
| **Target field types** | All array fields |
diff --git a/docs/fuzzers/field-fuzzers/replace-objects-with-arrays.md b/docs/fuzzers/field-fuzzers/replace-objects-with-arrays.md
index b1c988538..8839c9869 100644
--- a/docs/fuzzers/field-fuzzers/replace-objects-with-arrays.md
+++ b/docs/fuzzers/field-fuzzers/replace-objects-with-arrays.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | ReplaceObjectsWithArraysFieldsFuzzer |
-| **Log Key** | **ROWAFF** |
+| **Log Key** | **ROWAF** |
| **Description** | This fuzzer will replace JSON objects with JSON arrays. The expectation is that APIs will reject the request as invalid. This Fuzzer won't replace reference data. |
| **Enabled by default?** | Yes |
| **Target field types** | All object fields |
diff --git a/docs/fuzzers/field-fuzzers/replace-objects-with-primitives.md b/docs/fuzzers/field-fuzzers/replace-objects-with-primitives.md
index da2671fbf..1200232fa 100644
--- a/docs/fuzzers/field-fuzzers/replace-objects-with-primitives.md
+++ b/docs/fuzzers/field-fuzzers/replace-objects-with-primitives.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | ReplaceObjectsWithPrimitivesFieldsFuzzer |
-| **Log Key** | **ROWPFF** |
+| **Log Key** | **ROWPF** |
| **Description** | This fuzzer will replace JSON objects with primitive values. The expectation is that APIs will reject the request as invalid. This Fuzzer won't replace reference data. |
| **Enabled by default?** | Yes |
| **Target field types** | All non-primitive fields |
diff --git a/docs/fuzzers/field-fuzzers/replace-primitives-with-arrays.md b/docs/fuzzers/field-fuzzers/replace-primitives-with-arrays.md
index 4aac4dbe4..c0a7e7dd6 100644
--- a/docs/fuzzers/field-fuzzers/replace-primitives-with-arrays.md
+++ b/docs/fuzzers/field-fuzzers/replace-primitives-with-arrays.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | ReplacePrimitivesWithArraysFieldsFuzzer |
-| **Log Key** | **RPWAFF** |
+| **Log Key** | **RPWAF** |
| **Description** | This fuzzer will replace JSON primitives with JSON arrays. The expectation is that APIs will reject the request as invalid. This Fuzzer won't replace reference data. |
| **Enabled by default?** | Yes |
| **Target field types** | All primitive fields |
diff --git a/docs/fuzzers/field-fuzzers/replace-primitives-with-objects.md b/docs/fuzzers/field-fuzzers/replace-primitives-with-objects.md
index f862eb533..d7c4c533c 100644
--- a/docs/fuzzers/field-fuzzers/replace-primitives-with-objects.md
+++ b/docs/fuzzers/field-fuzzers/replace-primitives-with-objects.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | ReplacePrimitivesWithObjectsFieldsFuzzer |
-| **Log Key** | **RPWOFF** |
+| **Log Key** | **RPWOF** |
| **Description** | This fuzzer will replace JSON primitives with JSON objects. The expectation is that APIs will reject the request as invalid. This Fuzzer won't replace reference data. |
| **Enabled by default?** | Yes |
| **Target field types** | All primitive fields |
diff --git a/docs/fuzzers/field-fuzzers/string-format-almost-valid.md b/docs/fuzzers/field-fuzzers/string-format-almost-valid.md
index 479e72129..ffdb07706 100644
--- a/docs/fuzzers/field-fuzzers/string-format-almost-valid.md
+++ b/docs/fuzzers/field-fuzzers/string-format-almost-valid.md
@@ -9,7 +9,7 @@ Run `cats list --formats` for a full list of supported formats.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | StringFormatAlmostValidValuesFuzzer |
-| **Log Key** | **SFAVVF** |
+| **Log Key** | **SFAVV** |
| **Description** | This fuzzer will target string fields with defined formats. It will generate values which are almost valid, hopping that the validation regexes of the APIs will fail. The expectation is that APIs will reject the requests as invalid. |
| **Enabled by default?** | Yes |
| **Target field types** | OpenAPI type `string` |
diff --git a/docs/fuzzers/field-fuzzers/string-format-wrong-values.md b/docs/fuzzers/field-fuzzers/string-format-wrong-values.md
index 13a463c69..89de1508c 100644
--- a/docs/fuzzers/field-fuzzers/string-format-wrong-values.md
+++ b/docs/fuzzers/field-fuzzers/string-format-wrong-values.md
@@ -9,7 +9,7 @@ Run `cats list --formats` for a full list of supported formats.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | StringFormatTotallyWrongValuesFuzzer |
-| **Log Key** | **SFTWVF** |
+| **Log Key** | **SFTWV** |
| **Description** | This fuzzer will target string fields with defined formats. It will generate values which are invalid for the given format, hopping that the validation regexes of the APIs will fail. The expectation is that APIs will reject the requests as invalid. |
| **Enabled by default?** | Yes |
| **Target field types** | OpenAPI type `string` |
diff --git a/docs/fuzzers/field-fuzzers/string-left-boundary.md b/docs/fuzzers/field-fuzzers/string-left-boundary.md
index 90c2a446c..02f11d42f 100644
--- a/docs/fuzzers/field-fuzzers/string-left-boundary.md
+++ b/docs/fuzzers/field-fuzzers/string-left-boundary.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | StringFieldsLeftBoundaryFuzzer |
-| **Log Key** | **SFLBF** |
+| **Log Key** | **SFLB** |
| **Description** | This fuzzer will send left boundary values in string fields. The expectation is that APIs will reject the request as invalid, as the value is shorter than the `minLength`. |
| **Enabled by default?** | Yes |
| **Target field types** | OpenAPI type `string` |
diff --git a/docs/fuzzers/field-fuzzers/string-right-boundary.md b/docs/fuzzers/field-fuzzers/string-right-boundary.md
index c41b0a186..688c59f65 100644
--- a/docs/fuzzers/field-fuzzers/string-right-boundary.md
+++ b/docs/fuzzers/field-fuzzers/string-right-boundary.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | StringFieldsRightBoundaryFuzzer |
-| **Log Key** | **SFRBF** |
+| **Log Key** | **SFRB** |
| **Description** | This fuzzer will send right boundary values in string fields. The expectation is that APIs will reject the request as invalid, as the value is larger than the `maxLength`. |
| **Enabled by default?** | Yes |
| **Target field types** | OpenAPI type `string` |
diff --git a/docs/fuzzers/field-fuzzers/strings-in-numeric.md b/docs/fuzzers/field-fuzzers/strings-in-numeric.md
index 4eded99ac..4537db5ac 100644
--- a/docs/fuzzers/field-fuzzers/strings-in-numeric.md
+++ b/docs/fuzzers/field-fuzzers/strings-in-numeric.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | StringsInNumericFieldsFuzzer |
-| **Log Key** | **NVIFF** |
+| **Log Key** | **SINF** |
| **Description** | This fuzzer will send random string values in numeric fields. The expectation is that APIs will reject the request as invalid. |
| **Enabled by default?** | Yes |
| **Target field types** | OpenAPI type `integer` and `number` |
diff --git a/docs/fuzzers/field-fuzzers/trail-control-chars.md b/docs/fuzzers/field-fuzzers/trail-control-chars.md
index 1f83d0ca5..ed719707c 100644
--- a/docs/fuzzers/field-fuzzers/trail-control-chars.md
+++ b/docs/fuzzers/field-fuzzers/trail-control-chars.md
@@ -10,7 +10,7 @@ This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | TrailingControlCharsInFieldsTrimValidateFuzzer |
-| **Log Key** | **TCCIFF** |
+| **Log Key** | **TCCIF** |
| **Description** | This fuzzer trails fields with [unicode control characters](https://en.wikipedia.org/wiki/Control_character). The expectation is that APIs will sanitize the input values, thus removing control characters and handle the request as a happy path. |
| **Enabled by default?** | No. You need to supply `--includeControlChars` argument |
| **Target field types** | All |
@@ -26,7 +26,7 @@ This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | TrailingControlCharsInFieldsValidateTrimFuzzer |
-| **Log Key** | **TCCIFF** |
+| **Log Key** | **TCCIF** |
| **Description** | This fuzzer trails fields with [unicode control characters](https://en.wikipedia.org/wiki/Control_character). As the sanitization is assumed post-validation, the expectation is that APIs reject the request as invalid. |
| **Enabled by default?** | No. You need to supply `--includeControlChars` argument |
| **Target field types** | All |
diff --git a/docs/fuzzers/field-fuzzers/trailing-multi-codepoint-emojis.md b/docs/fuzzers/field-fuzzers/trailing-multi-codepoint-emojis.md
index 2d647da57..1b105900d 100644
--- a/docs/fuzzers/field-fuzzers/trailing-multi-codepoint-emojis.md
+++ b/docs/fuzzers/field-fuzzers/trailing-multi-codepoint-emojis.md
@@ -10,7 +10,7 @@ This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | TrailingMultiCodePointEmojisInFieldsTrimValidateFuzzer |
-| **Log Key** | **TMCPEIFF** |
+| **Log Key** | **TMCPEIF** |
| **Description** | This fuzzer trails fields with multi-codepoint emojis. The expectation is that APIs will sanitize the input values, thus removing emojis and handle the request as a happy path. |
| **Enabled by default?** | No. You need to supply `--includeEmojis` argument |
| **Target field types** | All |
@@ -26,7 +26,7 @@ This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | TrailingMultiCodePointEmojisInFieldsValidateTrimFuzzer |
-| **Log Key** | **TMCPEIFF** |
+| **Log Key** | **TMCPEIF** |
| **Description** | This fuzzer trails fields with multi-codepoint emojis. As the sanitization is assumed post-validation, the expectation is that APIs reject the request as invalid. |
| **Enabled by default?** | No. You need to supply `--includeEmojis` argument |
| **Target field types** | All |
diff --git a/docs/fuzzers/field-fuzzers/trailing-single-codepoint-emojis.md b/docs/fuzzers/field-fuzzers/trailing-single-codepoint-emojis.md
index 09cc8eeab..854077c22 100644
--- a/docs/fuzzers/field-fuzzers/trailing-single-codepoint-emojis.md
+++ b/docs/fuzzers/field-fuzzers/trailing-single-codepoint-emojis.md
@@ -10,7 +10,7 @@ This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | TrailingSingleCodePointEmojisInFieldsTrimValidateFuzzer |
-| **Log Key** | **TSCPEIFF** |
+| **Log Key** | **TSCPEIF** |
| **Description** | This fuzzer trails fields with single-codepoint emojis. The expectation is that APIs will sanitize the input values, thus removing emojis and handle the request as a happy path. |
| **Enabled by default?** | No. You need to supply `--includeEmojis` argument |
| **Target field types** | All |
@@ -26,7 +26,7 @@ This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | TrailingSingleCodePointEmojisInFieldsValidateTrimFuzzer |
-| **Log Key** | **TSCPEIFF** |
+| **Log Key** | **TSCPEIF** |
| **Description** | This fuzzer trails fields with single-codepoint emojis. As the sanitization is assumed post-validation, the expectation is that APIs reject the request as invalid. |
| **Enabled by default?** | No. You need to supply `--includeEmojis` argument |
| **Target field types** | All |
diff --git a/docs/fuzzers/field-fuzzers/trailing-whitespaces.md b/docs/fuzzers/field-fuzzers/trailing-whitespaces.md
index 3486ba1a8..0ea7458c0 100644
--- a/docs/fuzzers/field-fuzzers/trailing-whitespaces.md
+++ b/docs/fuzzers/field-fuzzers/trailing-whitespaces.md
@@ -10,7 +10,7 @@ This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | TrailingWhitespacesInFieldsTrimValidateFuzzer |
-| **Log Key** | **TWIFF** |
+| **Log Key** | **TWIF** |
| **Description** | This fuzzer trails fields with [whitespaces](https://en.wikipedia.org/wiki/Whitespace_character). The expectation is that APIs will sanitize the input values, thus removing whitespaces and handle the request as a happy path. |
| **Enabled by default?** | No. You need to supply `--includeWhitespaces` argument |
| **Target field types** | All |
@@ -26,7 +26,7 @@ This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | TrailingWhitespacesInFieldsValidateTrimFuzzer |
-| **Log Key** | **TWIFF** |
+| **Log Key** | **TWIF** |
| **Description** | This fuzzer trails fields with [whitespaces](https://en.wikipedia.org/wiki/Whitespace_character). As the sanitization is assumed post-validation, the expectation is that APIs reject the request as invalid. |
| **Enabled by default?** | No. You need to supply `--includeWhitespaces` argument |
| **Target field types** | All |
diff --git a/docs/fuzzers/field-fuzzers/very-large-decimals-numeric.md b/docs/fuzzers/field-fuzzers/very-large-decimals-numeric.md
index c3bc050fb..205f5ab76 100644
--- a/docs/fuzzers/field-fuzzers/very-large-decimals-numeric.md
+++ b/docs/fuzzers/field-fuzzers/very-large-decimals-numeric.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | VeryLargeDecimalsInNumericFieldsFuzzer |
-| **Log Key** | **VLDINFF** |
+| **Log Key** | **VLDINF** |
| **Description** | This fuzzer will send very large decimal numbers in number fields. The expectation is that APIs will reject the request as invalid as they might potentially break downstream systems. Furthermore, APIs should update their specs to define clear boundaries (`minimum`, `maximum`) for these fields. |
| **Enabled by default?** | Yes |
| **Target field types** | OpenAPI type `number` or `integer` |
diff --git a/docs/fuzzers/field-fuzzers/very-large-integers-numeric.md b/docs/fuzzers/field-fuzzers/very-large-integers-numeric.md
index de8cbb887..145c496a0 100644
--- a/docs/fuzzers/field-fuzzers/very-large-integers-numeric.md
+++ b/docs/fuzzers/field-fuzzers/very-large-integers-numeric.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | VeryLargeIntegersInNumericFieldsFuzzer |
-| **Log Key** | **VLIINFF** |
+| **Log Key** | **VLIINF** |
| **Description** | This fuzzer will send very large integer numbers in number fields. The expectation is that APIs will reject the request as invalid as they might potentially break downstream systems. Furthermore, APIs should update their specs to define clear boundaries (`minimum`, `maximum`) for these fields. |
| **Enabled by default?** | Yes |
| **Target field types** | OpenAPI type `number` or `integer` |
diff --git a/docs/fuzzers/field-fuzzers/very-large-strings.md b/docs/fuzzers/field-fuzzers/very-large-strings.md
index c14822d32..15727c76e 100644
--- a/docs/fuzzers/field-fuzzers/very-large-strings.md
+++ b/docs/fuzzers/field-fuzzers/very-large-strings.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | VeryLargeStringsInFieldsFuzzer |
-| **Log Key** | **VLSIFF** |
+| **Log Key** | **VLSIF** |
| **Description** | This fuzzer will send very large strings in fields. The expectation is that APIs will reject the request as invalid as they might potentially break downstream systems. Furthermore, APIs should update their specs to define clear boundaries (`minimum`, `maximum`, `minLength`, `maxLength`) for these fields. |
| **Enabled by default?** | Yes |
| **Target field types** | All |
diff --git a/docs/fuzzers/field-fuzzers/very-large-unicodes-strings.md b/docs/fuzzers/field-fuzzers/very-large-unicodes-strings.md
index 4eeee72b8..ea67e0fb5 100644
--- a/docs/fuzzers/field-fuzzers/very-large-unicodes-strings.md
+++ b/docs/fuzzers/field-fuzzers/very-large-unicodes-strings.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | VeryLargeUnicodeStringsInFieldsFuzzer |
-| **Log Key** | **VLUSIFF** |
+| **Log Key** | **VLUSIF** |
| **Description** | This fuzzer will send very large strings with random Unicode values. The expectation is that APIs will reject the request as invalid as they might potentially break downstream systems. Furthermore, APIs should update their specs to define clear boundaries (`minimum`, `maximum`, `minLength`, `maxLength`) for these fields. |
| **Enabled by default?** | Yes |
| **Target field types** | All |
diff --git a/docs/fuzzers/field-fuzzers/within-control-chars.md b/docs/fuzzers/field-fuzzers/within-control-chars.md
index 2ad1d8004..3a4075546 100644
--- a/docs/fuzzers/field-fuzzers/within-control-chars.md
+++ b/docs/fuzzers/field-fuzzers/within-control-chars.md
@@ -7,33 +7,33 @@ hide_table_of_contents: true
This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
## Within Control Characters In Fields TRIM_AND_VALIDATE
-| Item | Description |
-|:--------------------------------------------------------------------|:---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
-| **Full Fuzzer Name** | WithinControlCharsInFieldsTrimValidateFuzzer |
-| **Log Key** | **WCCIFF** |
-| **Description** | This fuzzer inserts [unicode control characters](https://en.wikipedia.org/wiki/Control_character) within fields. The expectation is that APIs will sanitize the input values, thus removing control characters and handle the request as a happy path. |
-| **Enabled by default?** | No. You need to supply `--includeControlChars` argument |
-| **Target field types** | All |
-| **Expected result when fuzzed field is required** | `2XX` |
-| **Expected result when fuzzed field is optional** | `2XX` |
-| **Expected result when fuzzed value is not matching field pattern** | `2XX` |
-| **Fuzzing logic** | Iteratively **inserts** control characters within fields |
-| **Conditions when this fuzzer will be skipped** | When field is a `discriminator` |
-| **HTTP methods that will be skipped** | None |
-| **Reporting** | Reports `error` if: *1.* response code is `404`; *2.* response code is documented, but not expected; *3.* any unexpected exception.
Reports `warn` if: *1.* response code is expected and documented, but not matches response schema; *2.* response code is expected, but not documented; *3.* response code is `501`.
Reports `success` if: *1.* response code is expected, documented and matches response schema. |
+| Item | Description |
+|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **Full Fuzzer Name** | WithinControlCharsInFieldsTrimValidateFuzzer |
+| **Log Key** | **WCCIF** |
+| **Description** | This fuzzer inserts [unicode control characters](https://en.wikipedia.org/wiki/Control_character) within fields. The expectation is that APIs will sanitize the input values, thus removing control characters and handle the request as a happy path. |
+| **Enabled by default?** | No. You need to supply `--includeControlChars` argument |
+| **Target field types** | All |
+| **Expected result when fuzzed field is required** | `2XX` |
+| **Expected result when fuzzed field is optional** | `2XX` |
+| **Expected result when fuzzed value is not matching field pattern** | `2XX` |
+| **Fuzzing logic** | Iteratively **inserts** control characters within fields |
+| **Conditions when this fuzzer will be skipped** | When field is a `discriminator` |
+| **HTTP methods that will be skipped** | None |
+| **Reporting** | Reports `error` if: *1.* response code is `404`; *2.* response code is documented, but not expected; *3.* any unexpected exception.
Reports `warn` if: *1.* response code is expected and documented, but not matches response schema; *2.* response code is expected, but not documented; *3.* response code is `501`.
Reports `success` if: *1.* response code is expected, documented and matches response schema. |
## Within Control Characters In Fields VALIDATE_AND_TRIM
-| Item | Description |
-|:--------------------------------------------------------------------|:---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
-| **Full Fuzzer Name** | WithinControlCharsInFieldsValidateTrimFuzzer |
-| **Log Key** | **WCCIFF** |
-| **Description** | This fuzzer inserts [unicode control characters](https://en.wikipedia.org/wiki/Control_character) within fields. As the sanitization is assumed post-validation, the expectation is that APIs reject the request as invalid. |
-| **Enabled by default?** | No. You need to supply `--includeControlChars` argument |
-| **Target field types** | All |
-| **Expected result when fuzzed field is required** | `4XX` |
-| **Expected result when fuzzed field is optional** | `4XX` |
-| **Expected result when fuzzed value is not matching field pattern** | `4XX` |
-| **Fuzzing logic** | Iteratively **inserts** control characters within fields |
-| **Conditions when this fuzzer will be skipped** | When field is a `discriminator` |
-| **HTTP methods that will be skipped** | None |
-| **Reporting** | Reports `error` if: *1.* response code is `404`; *2.* response code is documented, but not expected; *3.* any unexpected exception.
Reports `warn` if: *1.* response code is expected and documented, but not matches response schema; *2.* response code is expected, but not documented; *3.* response code is `501`.
Reports `success` if: *1.* response code is expected, documented and matches response schema. |
+| Item | Description |
+|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **Full Fuzzer Name** | WithinControlCharsInFieldsValidateTrimFuzzer |
+| **Log Key** | **WCCIF** |
+| **Description** | This fuzzer inserts [unicode control characters](https://en.wikipedia.org/wiki/Control_character) within fields. As the sanitization is assumed post-validation, the expectation is that APIs reject the request as invalid. |
+| **Enabled by default?** | No. You need to supply `--includeControlChars` argument |
+| **Target field types** | All |
+| **Expected result when fuzzed field is required** | `4XX` |
+| **Expected result when fuzzed field is optional** | `4XX` |
+| **Expected result when fuzzed value is not matching field pattern** | `4XX` |
+| **Fuzzing logic** | Iteratively **inserts** control characters within fields |
+| **Conditions when this fuzzer will be skipped** | When field is a `discriminator` |
+| **HTTP methods that will be skipped** | None |
+| **Reporting** | Reports `error` if: *1.* response code is `404`; *2.* response code is documented, but not expected; *3.* any unexpected exception.
Reports `warn` if: *1.* response code is expected and documented, but not matches response schema; *2.* response code is expected, but not documented; *3.* response code is `501`.
Reports `success` if: *1.* response code is expected, documented and matches response schema. |
diff --git a/docs/fuzzers/field-fuzzers/within-multi-codepoint-emojis.md b/docs/fuzzers/field-fuzzers/within-multi-codepoint-emojis.md
index 2e6d20629..ca87312f3 100644
--- a/docs/fuzzers/field-fuzzers/within-multi-codepoint-emojis.md
+++ b/docs/fuzzers/field-fuzzers/within-multi-codepoint-emojis.md
@@ -7,33 +7,33 @@ hide_table_of_contents: true
This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
## Within Multi Code Point Emojis In Fields TRIM_AND_VALIDATE
-| Item | Description |
-|:--------------------------------------------------------------------|:---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
-| **Full Fuzzer Name** | WithinMultiCodePointEmojisInFieldsTrimValidateFuzzer |
-| **Log Key** | **WMCPEIFF** |
-| **Description** | This fuzzer inserts multi-codepoint emojis within fields. The expectation is that APIs will sanitize the input values, thus removing emojis and handle the request as a happy path. |
-| **Enabled by default?** | No. You need to supply `--includeEmojis` argument |
-| **Target field types** | All |
-| **Expected result when fuzzed field is required** | `2XX` |
-| **Expected result when fuzzed field is optional** | `2XX` |
-| **Expected result when fuzzed value is not matching field pattern** | `2XX` |
-| **Fuzzing logic** | Iteratively **inserts** multi-codepoint emojis 👩🚀 within fields |
-| **Conditions when this fuzzer will be skipped** | When field is a `discriminator` |
-| **HTTP methods that will be skipped** | None |
-| **Reporting** | Reports `error` if: *1.* response code is `404`; *2.* response code is documented, but not expected; *3.* any unexpected exception.
Reports `warn` if: *1.* response code is expected and documented, but not matches response schema; *2.* response code is expected, but not documented; *3.* response code is `501`.
Reports `success` if: *1.* response code is expected, documented and matches response schema. |
+| Item | Description |
+|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **Full Fuzzer Name** | WithinMultiCodePointEmojisInFieldsTrimValidateFuzzer |
+| **Log Key** | **WMCPEIF** |
+| **Description** | This fuzzer inserts multi-codepoint emojis within fields. The expectation is that APIs will sanitize the input values, thus removing emojis and handle the request as a happy path. |
+| **Enabled by default?** | No. You need to supply `--includeEmojis` argument |
+| **Target field types** | All |
+| **Expected result when fuzzed field is required** | `2XX` |
+| **Expected result when fuzzed field is optional** | `2XX` |
+| **Expected result when fuzzed value is not matching field pattern** | `2XX` |
+| **Fuzzing logic** | Iteratively **inserts** multi-codepoint emojis 👩🚀 within fields |
+| **Conditions when this fuzzer will be skipped** | When field is a `discriminator` |
+| **HTTP methods that will be skipped** | None |
+| **Reporting** | Reports `error` if: *1.* response code is `404`; *2.* response code is documented, but not expected; *3.* any unexpected exception.
Reports `warn` if: *1.* response code is expected and documented, but not matches response schema; *2.* response code is expected, but not documented; *3.* response code is `501`.
Reports `success` if: *1.* response code is expected, documented and matches response schema. |
## Within Control Characters In Fields VALIDATE_AND_TRIM
-| Item | Description |
-|:--------------------------------------------------------------------|:---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
-| **Full Fuzzer Name** | WithinMultiCodePointEmojisInFieldsValidateTrimFuzzer |
-| **Log Key** | **WMCPEIFF** |
-| **Description** | This fuzzer inserts multi-codepoint emojis within fields. As the sanitization is assumed post-validation, the expectation is that APIs reject the request as invalid. |
-| **Enabled by default?** | No. You need to supply `--includeEmojis` argument |
-| **Target field types** | All |
-| **Expected result when fuzzed field is required** | `4XX` |
-| **Expected result when fuzzed field is optional** | `4XX` |
-| **Expected result when fuzzed value is not matching field pattern** | `4XX` |
-| **Fuzzing logic** | Iteratively **inserts** multi-codepoint emojis 👩🚀 within fields |
-| **Conditions when this fuzzer will be skipped** | When field is a `discriminator` |
-| **HTTP methods that will be skipped** | None |
-| **Reporting** | Reports `error` if: *1.* response code is `404`; *2.* response code is documented, but not expected; *3.* any unexpected exception.
Reports `warn` if: *1.* response code is expected and documented, but not matches response schema; *2.* response code is expected, but not documented; *3.* response code is `501`.
Reports `success` if: *1.* response code is expected, documented and matches response schema. |
+| Item | Description |
+|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **Full Fuzzer Name** | WithinMultiCodePointEmojisInFieldsValidateTrimFuzzer |
+| **Log Key** | **WMCPEIF** |
+| **Description** | This fuzzer inserts multi-codepoint emojis within fields. As the sanitization is assumed post-validation, the expectation is that APIs reject the request as invalid. |
+| **Enabled by default?** | No. You need to supply `--includeEmojis` argument |
+| **Target field types** | All |
+| **Expected result when fuzzed field is required** | `4XX` |
+| **Expected result when fuzzed field is optional** | `4XX` |
+| **Expected result when fuzzed value is not matching field pattern** | `4XX` |
+| **Fuzzing logic** | Iteratively **inserts** multi-codepoint emojis 👩🚀 within fields |
+| **Conditions when this fuzzer will be skipped** | When field is a `discriminator` |
+| **HTTP methods that will be skipped** | None |
+| **Reporting** | Reports `error` if: *1.* response code is `404`; *2.* response code is documented, but not expected; *3.* any unexpected exception.
Reports `warn` if: *1.* response code is expected and documented, but not matches response schema; *2.* response code is expected, but not documented; *3.* response code is `501`.
Reports `success` if: *1.* response code is expected, documented and matches response schema. |
diff --git a/docs/fuzzers/field-fuzzers/within-single-codepoint-emojis.md b/docs/fuzzers/field-fuzzers/within-single-codepoint-emojis.md
index 494074ff1..c5a0bc0ae 100644
--- a/docs/fuzzers/field-fuzzers/within-single-codepoint-emojis.md
+++ b/docs/fuzzers/field-fuzzers/within-single-codepoint-emojis.md
@@ -7,33 +7,33 @@ hide_table_of_contents: true
This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
## Within Single Code Point Emojis In Fields TRIM_AND_VALIDATE
+| Item | Description |
+|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **Full Fuzzer Name** | WithinSingleCodePointEmojisInFieldsTrimValidateFuzzer |
+| **Log Key** | **WSCPEIF** |
+| **Description** | This fuzzer inserts single-codepoint emojis within fields. The expectation is that APIs will sanitize the input values, thus removing emojis and handle the request as a happy path. |
+| **Enabled by default?** | No. You need to supply `--includeEmojis` argument |
+| **Target field types** | All |
+| **Expected result when fuzzed field is required** | `2XX` |
+| **Expected result when fuzzed field is optional** | `2XX` |
+| **Expected result when fuzzed value is not matching field pattern** | `2XX` |
+| **Fuzzing logic** | Iteratively **inserts** single-codepoint emojis: 👾 within fields |
+| **Conditions when this fuzzer will be skipped** | When field is a `discriminator` |
+| **HTTP methods that will be skipped** | None |
+| **Reporting** | Reports `error` if: *1.* response code is `404`; *2.* response code is documented, but not expected; *3.* any unexpected exception.
Reports `warn` if: *1.* response code is expected and documented, but not matches response schema; *2.* response code is expected, but not documented; *3.* response code is `501`.
Reports `success` if: *1.* response code is expected, documented and matches response schema. |
+
+## Within Control Characters In Fields VALIDATE_AND_TRIM
| Item | Description |
|:--------------------------------------------------------------------|:---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
-| **Full Fuzzer Name** | WithinSingleCodePointEmojisInFieldsTrimValidateFuzzer |
-| **Log Key** | **WSCPEIFF** |
-| **Description** | This fuzzer inserts single-codepoint emojis within fields. The expectation is that APIs will sanitize the input values, thus removing emojis and handle the request as a happy path. |
+| **Full Fuzzer Name** | WithinSingleCodePointEmojisInFieldsValidateTrimFuzzer |
+| **Log Key** | **WSCPEIF** |
+| **Description** | This fuzzer insertssingle-codepoint emojis within fields. As the sanitization is assumed post-validation, the expectation is that APIs reject the request as invalid. |
| **Enabled by default?** | No. You need to supply `--includeEmojis` argument |
| **Target field types** | All |
-| **Expected result when fuzzed field is required** | `2XX` |
-| **Expected result when fuzzed field is optional** | `2XX` |
-| **Expected result when fuzzed value is not matching field pattern** | `2XX` |
+| **Expected result when fuzzed field is required** | `4XX` |
+| **Expected result when fuzzed field is optional** | `4XX` |
+| **Expected result when fuzzed value is not matching field pattern** | `4XX` |
| **Fuzzing logic** | Iteratively **inserts** single-codepoint emojis: 👾 within fields |
| **Conditions when this fuzzer will be skipped** | When field is a `discriminator` |
| **HTTP methods that will be skipped** | None |
| **Reporting** | Reports `error` if: *1.* response code is `404`; *2.* response code is documented, but not expected; *3.* any unexpected exception.
Reports `warn` if: *1.* response code is expected and documented, but not matches response schema; *2.* response code is expected, but not documented; *3.* response code is `501`.
Reports `success` if: *1.* response code is expected, documented and matches response schema. |
-
-## Within Control Characters In Fields VALIDATE_AND_TRIM
-| Item | Description |
-|:--------------------------------------------------------------------|:----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
-| **Full Fuzzer Name** | WithinSingleCodePointEmojisInFieldsValidateTrimFuzzer |
-| **Log Key** | **WSCPEIFF** |
-| **Description** | This fuzzer insertssingle-codepoint emojis within fields. As the sanitization is assumed post-validation, the expectation is that APIs reject the request as invalid. |
-| **Enabled by default?** | No. You need to supply `--includeEmojis` argument |
-| **Target field types** | All |
-| **Expected result when fuzzed field is required** | `4XX` |
-| **Expected result when fuzzed field is optional** | `4XX` |
-| **Expected result when fuzzed value is not matching field pattern** | `4XX` |
-| **Fuzzing logic** | Iteratively **inserts** single-codepoint emojis: 👾 within fields |
-| **Conditions when this fuzzer will be skipped** | When field is a `discriminator` |
-| **HTTP methods that will be skipped** | None |
-| **Reporting** | Reports `error` if: *1.* response code is `404`; *2.* response code is documented, but not expected; *3.* any unexpected exception.
Reports `warn` if: *1.* response code is expected and documented, but not matches response schema; *2.* response code is expected, but not documented; *3.* response code is `501`.
Reports `success` if: *1.* response code is expected, documented and matches response schema. |
diff --git a/docs/fuzzers/field-fuzzers/within-whitespaces.md b/docs/fuzzers/field-fuzzers/within-whitespaces.md
index ae1e943ad..ce51e50ea 100644
--- a/docs/fuzzers/field-fuzzers/within-whitespaces.md
+++ b/docs/fuzzers/field-fuzzers/within-whitespaces.md
@@ -10,7 +10,7 @@ This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | WithinWhitespacesInFieldsTrimValidateFuzzer |
-| **Log Key** | **WWIFF** |
+| **Log Key** | **WWIF** |
| **Description** | This fuzzer inserts [whitespaces](https://en.wikipedia.org/wiki/Whitespace_character) within fields. The expectation is that APIs will sanitize the input values, thus removing whitespaces and handle the request as a happy path. |
| **Enabled by default?** | No. You need to supply `--includeWhitespaces` argument |
| **Target field types** | All |
@@ -26,7 +26,7 @@ This Fuzzer has 2 flavours depending on the `--edgeSpacesStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | WithinWhitespacesInFieldsValidateTrimFuzzer |
-| **Log Key** | **WWIFF** |
+| **Log Key** | **WWIF** |
| **Description** | This fuzzer inserts [whitespaces](https://en.wikipedia.org/wiki/Whitespace_character) within fields. As the sanitization is assumed post-validation, the expectation is that APIs reject the request as invalid. |
| **Enabled by default?** | No. You need to supply `--includeWhitespaces` argument |
| **Target field types** | All |
diff --git a/docs/fuzzers/field-fuzzers/zalgo-text-fields.md b/docs/fuzzers/field-fuzzers/zalgo-text-fields.md
index 5f63f7f57..894f01ee7 100644
--- a/docs/fuzzers/field-fuzzers/zalgo-text-fields.md
+++ b/docs/fuzzers/field-fuzzers/zalgo-text-fields.md
@@ -10,7 +10,7 @@ This Fuzzer has 2 flavours depending on the `--sanitizationStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | ZalgoTextInFieldsSanitizeValidateFuzzer |
-| **Log Key** | **ZTIFF** |
+| **Log Key** | **ZTIF** |
| **Description** | This fuzzer prefixes fields with [zalgo text](https://en.wikipedia.org/wiki/Zalgo_text). The expectation is that APIs will sanitize the input values, thus removing zalgo text and handle the request as a happy path. |
| **Enabled by default?** | Yes |
| **Target field types** | All |
@@ -27,7 +27,7 @@ This Fuzzer has 2 flavours depending on the `--sanitizationStrategy`.
| Item | Description |
|:--------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | ZalgoTextInFieldsValidateSanitizeFuzzer |
-| **Log Key** | **ZTIFF** |
+| **Log Key** | **ZTIF** |
| **Description** | This fuzzer prefixes fields with [zalgo text](https://en.wikipedia.org/wiki/Zalgo_text). As the sanitization is assumed post-validation, the expectation is that APIs reject the request as invalid. |
| **Enabled by default?** | Yes |
| **Target field types** | All |
diff --git a/docs/fuzzers/header-fuzzers/abugidas-headers.md b/docs/fuzzers/header-fuzzers/abugidas-headers.md
index 5f746d04c..8760a1590 100644
--- a/docs/fuzzers/header-fuzzers/abugidas-headers.md
+++ b/docs/fuzzers/header-fuzzers/abugidas-headers.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | AbugidasInHeadersFuzzer |
-| **Log Key** | **AIHF** |
+| **Log Key** | **AIH** |
| **Description** | This fuzzer replaces headers with [abugida](https://en.wikipedia.org/wiki/Abugida) characters (జ్ఞా and স্রু). The expectation is that APIs will reject the request as invalid, as these characters should not be present in headers. |
| **Enabled by default?** | Yes |
| **Target header types** | All |
diff --git a/docs/fuzzers/header-fuzzers/check-security-headers.md b/docs/fuzzers/header-fuzzers/check-security-headers.md
index 8734535d6..7ea53dcc1 100644
--- a/docs/fuzzers/header-fuzzers/check-security-headers.md
+++ b/docs/fuzzers/header-fuzzers/check-security-headers.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | CheckSecurityHeadersFuzzer |
-| **Log Key** | **CSHF** |
+| **Log Key** | **CSH** |
| **Description** | This fuzzer will check if APIs respond with the recommended [security headers](https://owasp.org/www-project-secure-headers/). The Fuzzer will send happy path requests. |
| **Enabled by default?** | Yes |
| **Target header types** | All |
diff --git a/docs/fuzzers/header-fuzzers/dummy-accept.md b/docs/fuzzers/header-fuzzers/dummy-accept.md
index 35894c64e..76d82a2a8 100644
--- a/docs/fuzzers/header-fuzzers/dummy-accept.md
+++ b/docs/fuzzers/header-fuzzers/dummy-accept.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | DummyAcceptHeadersFuzzer |
-| **Log Key** | **DAHF** |
+| **Log Key** | **DAH** |
| **Description** | This fuzzer will add a dummy `Accept` header. The Fuzzer will send happy path requests. The expectation is that APIs will reject the request with `406`. |
| **Enabled by default?** | Yes |
| **Target header types** | All |
diff --git a/docs/fuzzers/header-fuzzers/dummy-content-length.md b/docs/fuzzers/header-fuzzers/dummy-content-length.md
index 2df3d7258..74dbd0e96 100644
--- a/docs/fuzzers/header-fuzzers/dummy-content-length.md
+++ b/docs/fuzzers/header-fuzzers/dummy-content-length.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | DummyContentLengthHeadersFuzzer |
-| **Log Key** | **DCLHF** |
+| **Log Key** | **DCLH** |
| **Description** | This fuzzer will set a dummy `Content-Length` header. The Fuzzer will send happy path requests. The expectation is that APIs will reject the request with `400`. |
| **Enabled by default?** | Yes |
| **Target header types** | All |
diff --git a/docs/fuzzers/header-fuzzers/dummy-content-type.md b/docs/fuzzers/header-fuzzers/dummy-content-type.md
index 66ee12492..fe26fe462 100644
--- a/docs/fuzzers/header-fuzzers/dummy-content-type.md
+++ b/docs/fuzzers/header-fuzzers/dummy-content-type.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | DummyContentTypeHeadersFuzzer |
-| **Log Key** | **DCTHF** |
+| **Log Key** | **DCTH** |
| **Description** | This fuzzer will add a dummy `Content-Type` header. The Fuzzer will send happy path requests. The expectation is that APIs will reject the request with `415`. |
| **Enabled by default?** | Yes |
| **Target header types** | All |
diff --git a/docs/fuzzers/header-fuzzers/dummy-transfer-encoding.md b/docs/fuzzers/header-fuzzers/dummy-transfer-encoding.md
index e03a974ce..696554a9d 100644
--- a/docs/fuzzers/header-fuzzers/dummy-transfer-encoding.md
+++ b/docs/fuzzers/header-fuzzers/dummy-transfer-encoding.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | DummyTransferEncodingHeadersFuzzer |
-| **Log Key** | **DTEHF** |
+| **Log Key** | **DTEH** |
| **Description** | This fuzzer will set a dummy `Transfer-Encoding` header. The Fuzzer will send happy path requests. The expectation is that APIs will reject the request either with `400` or `501`. |
| **Enabled by default?** | Yes |
| **Target header types** | All |
diff --git a/docs/fuzzers/header-fuzzers/duplicate-headers.md b/docs/fuzzers/header-fuzzers/duplicate-headers.md
index 1a96a143e..7d39da27c 100644
--- a/docs/fuzzers/header-fuzzers/duplicate-headers.md
+++ b/docs/fuzzers/header-fuzzers/duplicate-headers.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | DuplicateHeadersFuzzer |
-| **Log Key** | **DHF** |
+| **Log Key** | **DH** |
| **Description** | This fuzzer will send duplicate headers. Even though the HTTP protocol allows duplicate headers, the expectation is that APIs will reject the request as invalid, in order to prevent unwanted behaviour. |
| **Enabled by default?** | Yes |
| **Target header types** | All |
diff --git a/docs/fuzzers/header-fuzzers/empty-strings.md b/docs/fuzzers/header-fuzzers/empty-strings.md
index f0f295252..8279fdfe8 100644
--- a/docs/fuzzers/header-fuzzers/empty-strings.md
+++ b/docs/fuzzers/header-fuzzers/empty-strings.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | EmptyStringsInHeadersFuzzer |
-| **Log Key** | **ESIHF** |
+| **Log Key** | **ESIH** |
| **Description** | This fuzzer replaces headers with empty strings. The expectation is that APIs will reject the request as invalid for required headers, as these headers does not contain any value. |
| **Enabled by default?** | Yes |
| **Target header types** | All |
diff --git a/docs/fuzzers/header-fuzzers/extra-headers.md b/docs/fuzzers/header-fuzzers/extra-headers.md
index 28399e4e4..c99b73631 100644
--- a/docs/fuzzers/header-fuzzers/extra-headers.md
+++ b/docs/fuzzers/header-fuzzers/extra-headers.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | ExtraHeadersFuzzer |
-| **Log Key** | **EHF** |
+| **Log Key** | **EH** |
| **Description** | This fuzzer will add an extra header. The expectation is that APIs will properly process the request without unwanted behaviour. |
| **Enabled by default?** | Yes |
| **Target header types** | All |
diff --git a/docs/fuzzers/header-fuzzers/invalid-content-length.md b/docs/fuzzers/header-fuzzers/invalid-content-length.md
index 26b785379..87b705d10 100644
--- a/docs/fuzzers/header-fuzzers/invalid-content-length.md
+++ b/docs/fuzzers/header-fuzzers/invalid-content-length.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | InvalidContentLengthHeadersFuzzer |
-| **Log Key** | **ICLHF** |
+| **Log Key** | **ICLH** |
| **Description** | This fuzzer will set an invalid `Content-Length` header. The Fuzzer will send happy path requests. The expectation is that APIs will reject the request with `400`. |
| **Enabled by default?** | Yes |
| **Target header types** | All |
diff --git a/docs/fuzzers/header-fuzzers/large-number-random-alpha-headers.md b/docs/fuzzers/header-fuzzers/large-number-random-alpha-headers.md
index 21dfd7805..c6da433cb 100644
--- a/docs/fuzzers/header-fuzzers/large-number-random-alpha-headers.md
+++ b/docs/fuzzers/header-fuzzers/large-number-random-alpha-headers.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | LargeNumberOfRandomAlphanumericHeadersFuzzer |
-| **Log Key** | **LNORAHF** |
+| **Log Key** | **LNORAH** |
| **Description** | This adds 10 000 random alphanumeric headers to the request. Header's values can are random alphanumeric values. The expectation is that APIs ignore them and process a happy path. |
| **Enabled by default?** | Yes |
| **Target header types** | N/A |
diff --git a/docs/fuzzers/header-fuzzers/large-number-random-headers.md b/docs/fuzzers/header-fuzzers/large-number-random-headers.md
index 96b135db6..7bc1b8542 100644
--- a/docs/fuzzers/header-fuzzers/large-number-random-headers.md
+++ b/docs/fuzzers/header-fuzzers/large-number-random-headers.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | LargeNumberOfRandomHeadersFuzzer |
-| **Log Key** | **LNORHF** |
+| **Log Key** | **LNORH** |
| **Description** | This adds 10 000 random headers to the request. Header's values can are random unicode values. The expectation is that APIs ignore them and process a happy path. |
| **Enabled by default?** | Yes |
| **Target header types** | N/A |
diff --git a/docs/fuzzers/header-fuzzers/leading-control-chars.md b/docs/fuzzers/header-fuzzers/leading-control-chars.md
index 3cfb5a68f..45c6a0183 100644
--- a/docs/fuzzers/header-fuzzers/leading-control-chars.md
+++ b/docs/fuzzers/header-fuzzers/leading-control-chars.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | LeadingControlCharsInHeadersFuzzer |
-| **Log Key** | **LCCIHF** |
+| **Log Key** | **LCCIH** |
| **Description** | This fuzzer prefixes headers with [unicode control characters](https://en.wikipedia.org/wiki/Control_character). The expectation is that APIs will reject the requests as invalid. |
| **Enabled by default?** | No. You need to supply `--includeControlChars` argument |
| **Target headers types** | All |
diff --git a/docs/fuzzers/header-fuzzers/leading-multi-codepoint-emojis.md b/docs/fuzzers/header-fuzzers/leading-multi-codepoint-emojis.md
index db6e4f733..43faa7c18 100644
--- a/docs/fuzzers/header-fuzzers/leading-multi-codepoint-emojis.md
+++ b/docs/fuzzers/header-fuzzers/leading-multi-codepoint-emojis.md
@@ -4,16 +4,16 @@ hide_table_of_contents: true
# Leading Multi Code Point Emojis
-| Item | Description |
-|:---------------------------------------------------|:-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
-| **Full Fuzzer Name** | LeadingMultiCodePointEmojisInHeadersFuzzer |
-| **Log Key** | **LMCPEIHF** |
-| **Description** | This fuzzer prefixes headers with multi-codepoint emojis. The expectation is that APIs will reject the requests as invalid. |
-| **Enabled by default?** | No. You need to supply `--includeEmojis` argument |
-| **Target headers types** | All |
-| **Expected result when fuzzed header is required** | `4XX` |
-| **Expected result when fuzzed header is optional** | `4XX` |
-| **Fuzzing logic** | Iteratively **prefixes** headers with multi-codepoint emojis: 👩🚀 |
-| **Conditions when this fuzzer will be skipped** | None |
-| **HTTP methods that will be skipped** | None |
-| **Reporting** | Reports `error` if: *1.* response code is `404`; *2.* response code is documented, but not expected; *3.* any unexpected exception.
Reports `warn` if: *1.* response code is expected and documented, but not matches response schema; *2.* response code is expected, but not documented; *3.* response code is `501`.
Reports `success` if: *1.* response code is expected, documented and matches response schema. |
+| Item | Description |
+|:---------------------------------------------------|:------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| **Full Fuzzer Name** | LeadingMultiCodePointEmojisInHeadersFuzzer |
+| **Log Key** | **LMCPEIH** |
+| **Description** | This fuzzer prefixes headers with multi-codepoint emojis. The expectation is that APIs will reject the requests as invalid. |
+| **Enabled by default?** | No. You need to supply `--includeEmojis` argument |
+| **Target headers types** | All |
+| **Expected result when fuzzed header is required** | `4XX` |
+| **Expected result when fuzzed header is optional** | `4XX` |
+| **Fuzzing logic** | Iteratively **prefixes** headers with multi-codepoint emojis: 👩🚀 |
+| **Conditions when this fuzzer will be skipped** | None |
+| **HTTP methods that will be skipped** | None |
+| **Reporting** | Reports `error` if: *1.* response code is `404`; *2.* response code is documented, but not expected; *3.* any unexpected exception.
Reports `warn` if: *1.* response code is expected and documented, but not matches response schema; *2.* response code is expected, but not documented; *3.* response code is `501`.
Reports `success` if: *1.* response code is expected, documented and matches response schema. |
diff --git a/docs/fuzzers/header-fuzzers/leading-single-codepoint-emojis.md b/docs/fuzzers/header-fuzzers/leading-single-codepoint-emojis.md
index c464cbe72..019052938 100644
--- a/docs/fuzzers/header-fuzzers/leading-single-codepoint-emojis.md
+++ b/docs/fuzzers/header-fuzzers/leading-single-codepoint-emojis.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | LeadingSingleCodePointEmojisInHeadersFuzzer |
-| **Log Key** | **LSCPEIHF** |
+| **Log Key** | **LSCPEIH** |
| **Description** | This fuzzer prefixes headers with single-codepoint emojis. The expectation is that APIs will reject the requests as invalid. |
| **Enabled by default?** | No. You need to supply `--includeEmojis` argument |
| **Target headers types** | All |
diff --git a/docs/fuzzers/header-fuzzers/leading-spaces.md b/docs/fuzzers/header-fuzzers/leading-spaces.md
index d0258ea06..c4224fbe2 100644
--- a/docs/fuzzers/header-fuzzers/leading-spaces.md
+++ b/docs/fuzzers/header-fuzzers/leading-spaces.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | LeadingSpacesInHeadersFuzzer |
-| **Log Key** | **LSIHF** |
+| **Log Key** | **LSIH** |
| **Description** | This fuzzer prefixes headers with spaces and tabs. The expectation is that APIs will trim the header values and treat the request as a happy path. |
| **Enabled by default?** | Yes |
| **Target header types** | All |
diff --git a/docs/fuzzers/header-fuzzers/leading-whitespaces.md b/docs/fuzzers/header-fuzzers/leading-whitespaces.md
index f8c85a1d8..cc8ab166d 100644
--- a/docs/fuzzers/header-fuzzers/leading-whitespaces.md
+++ b/docs/fuzzers/header-fuzzers/leading-whitespaces.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | LeadingWhitespacesInHeadersFuzzer |
-| **Log Key** | **LWIHF** |
+| **Log Key** | **LWIH** |
| **Description** | This fuzzer prefixes headers with [whitespaces](https://en.wikipedia.org/wiki/Whitespace_character). The expectation is that APIs will reject the requests as invalid. |
| **Enabled by default?** | No. You need to supply `--includeWhitespaces` argument |
| **Target headers types** | All |
diff --git a/docs/fuzzers/header-fuzzers/only-control-chars.md b/docs/fuzzers/header-fuzzers/only-control-chars.md
index fff7db759..76e47c46e 100644
--- a/docs/fuzzers/header-fuzzers/only-control-chars.md
+++ b/docs/fuzzers/header-fuzzers/only-control-chars.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | OnlyControlCharsInHeadersFuzzer |
-| **Log Key** | **OCCIHF** |
+| **Log Key** | **OCCIH** |
| **Description** | This fuzzer replaces headers with [unicode control characters](https://en.wikipedia.org/wiki/Control_character). The expectation is that APIs will reject the requests as invalid. |
| **Enabled by default?** | No. You need to supply `--includeControlChars` argument |
| **Target headers types** | All |
diff --git a/docs/fuzzers/header-fuzzers/only-multi-codepoint-emojis.md b/docs/fuzzers/header-fuzzers/only-multi-codepoint-emojis.md
index b5a4faf07..5fd20892a 100644
--- a/docs/fuzzers/header-fuzzers/only-multi-codepoint-emojis.md
+++ b/docs/fuzzers/header-fuzzers/only-multi-codepoint-emojis.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | OnlyMultiCodePointEmojisInHeadersFuzzer |
-| **Log Key** | **OMCPEIHF** |
+| **Log Key** | **OMCPEIH** |
| **Description** | This fuzzer replaces headers with multi-codepoint emojis. The expectation is that APIs will reject the requests as invalid. |
| **Enabled by default?** | No. You need to supply `--includeEmojis` argument |
| **Target headers types** | All |
diff --git a/docs/fuzzers/header-fuzzers/only-single-codepoint-emojis.md b/docs/fuzzers/header-fuzzers/only-single-codepoint-emojis.md
index f8135fb82..5d1609b8e 100644
--- a/docs/fuzzers/header-fuzzers/only-single-codepoint-emojis.md
+++ b/docs/fuzzers/header-fuzzers/only-single-codepoint-emojis.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | OnlySingleCodePointEmojisInHeadersFuzzer |
-| **Log Key** | **OSCPEIHF** |
+| **Log Key** | **OSCPEIH** |
| **Description** | This fuzzer replaces headers with single-codepoint emojis. The expectation is that APIs will reject the requests as invalid. |
| **Enabled by default?** | No. You need to supply `--includeEmojis` argument |
| **Target headers types** | All |
diff --git a/docs/fuzzers/header-fuzzers/only-spaces.md b/docs/fuzzers/header-fuzzers/only-spaces.md
index c5ca4f005..40705f287 100644
--- a/docs/fuzzers/header-fuzzers/only-spaces.md
+++ b/docs/fuzzers/header-fuzzers/only-spaces.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | OnlySpacesInHeadersFuzzer |
-| **Log Key** | **OSIHF** |
+| **Log Key** | **OSIH** |
| **Description** | This fuzzer replaces headers with spaces and tabs. The expectation is that APIs will trim the header values and treat the request as a happy path. |
| **Enabled by default?** | Yes |
| **Target header types** | All |
diff --git a/docs/fuzzers/header-fuzzers/only-whitespaces.md b/docs/fuzzers/header-fuzzers/only-whitespaces.md
index f5cf281ef..c37ae51cc 100644
--- a/docs/fuzzers/header-fuzzers/only-whitespaces.md
+++ b/docs/fuzzers/header-fuzzers/only-whitespaces.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | OnlyWhitespacesInHeadersFuzzer |
-| **Log Key** | **OWIHF** |
+| **Log Key** | **OWIH** |
| **Description** | This fuzzer replaces headers with [whitespaces](https://en.wikipedia.org/wiki/Whitespace_character). The expectation is that APIs will reject the requests as invalid. |
| **Enabled by default?** | No. You need to supply `--includeWhitespaces` argument |
| **Target headers types** | All |
diff --git a/docs/fuzzers/header-fuzzers/remove-headers.md b/docs/fuzzers/header-fuzzers/remove-headers.md
index 3e6ad9865..111641cef 100644
--- a/docs/fuzzers/header-fuzzers/remove-headers.md
+++ b/docs/fuzzers/header-fuzzers/remove-headers.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | RemoveHeadersFuzzer |
-| **Log Key** | **RHF** |
+| **Log Key** | **RH** |
| **Description** | This fuzzer will remove headers in different combinations. The expectation is that APIs will reject the request as invalid if required headers are removed. |
| **Enabled by default?** | Yes |
| **Target header types** | All |
diff --git a/docs/fuzzers/header-fuzzers/trailing-control-chars.md b/docs/fuzzers/header-fuzzers/trailing-control-chars.md
index 5d0fc47f6..e8148918d 100644
--- a/docs/fuzzers/header-fuzzers/trailing-control-chars.md
+++ b/docs/fuzzers/header-fuzzers/trailing-control-chars.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | TrailingControlCharsInHeadersFuzzer |
-| **Log Key** | **TCCIHF** |
+| **Log Key** | **TCCIH** |
| **Description** | This fuzzer trails headers with [unicode control characters](https://en.wikipedia.org/wiki/Control_character). The expectation is that APIs will reject the requests as invalid. |
| **Enabled by default?** | No. You need to supply `--includeControlChars` argument |
| **Target headers types** | All |
diff --git a/docs/fuzzers/header-fuzzers/trailing-multi-codepoint-emojis.md b/docs/fuzzers/header-fuzzers/trailing-multi-codepoint-emojis.md
index 7478ceb22..2765ccc0e 100644
--- a/docs/fuzzers/header-fuzzers/trailing-multi-codepoint-emojis.md
+++ b/docs/fuzzers/header-fuzzers/trailing-multi-codepoint-emojis.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | TrailingMultiCodePointEmojisInHeadersFuzzer |
-| **Log Key** | **TMCPEIHF** |
+| **Log Key** | **TMCPEIH** |
| **Description** | This fuzzer trails headers with multi-codepoint emojis. The expectation is that APIs will reject the requests as invalid. |
| **Enabled by default?** | No. You need to supply `--includeEmojis` argument |
| **Target headers types** | All |
diff --git a/docs/fuzzers/header-fuzzers/trailing-single-codepoint-emojis.md b/docs/fuzzers/header-fuzzers/trailing-single-codepoint-emojis.md
index 99cc4f7c1..3903b3d51 100644
--- a/docs/fuzzers/header-fuzzers/trailing-single-codepoint-emojis.md
+++ b/docs/fuzzers/header-fuzzers/trailing-single-codepoint-emojis.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | TrailingSingleCodePointEmojisInHeadersFuzzer |
-| **Log Key** | **TSCPEIHF** |
+| **Log Key** | **TSCPEIH** |
| **Description** | This fuzzer trails headers with single-codepoint emojis. The expectation is that APIs will reject the requests as invalid. |
| **Enabled by default?** | No. You need to supply `--includeEmojis` argument |
| **Target headers types** | All |
diff --git a/docs/fuzzers/header-fuzzers/trailing-spaces.md b/docs/fuzzers/header-fuzzers/trailing-spaces.md
index 91688f4b2..83f521873 100644
--- a/docs/fuzzers/header-fuzzers/trailing-spaces.md
+++ b/docs/fuzzers/header-fuzzers/trailing-spaces.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | TrailingSpacesInHeadersFuzzer |
-| **Log Key** | **TSIHF** |
+| **Log Key** | **TSIH** |
| **Description** | This fuzzer trails headers with spaces and tabs. The expectation is that APIs will trim the header values and treat the request as a happy path. |
| **Enabled by default?** | Yes |
| **Target header types** | All |
diff --git a/docs/fuzzers/header-fuzzers/trailing-whitespaces.md b/docs/fuzzers/header-fuzzers/trailing-whitespaces.md
index f00e3536e..574696f59 100644
--- a/docs/fuzzers/header-fuzzers/trailing-whitespaces.md
+++ b/docs/fuzzers/header-fuzzers/trailing-whitespaces.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | TrailingWhitespacesInHeadersFuzzer |
-| **Log Key** | **TWIHF** |
+| **Log Key** | **TWIH** |
| **Description** | This fuzzer trails headers with [whitespaces](https://en.wikipedia.org/wiki/Whitespace_character). The expectation is that APIs will reject the requests as invalid. |
| **Enabled by default?** | No. You need to supply `--includeWhitespaces` argument |
| **Target headers types** | All |
diff --git a/docs/fuzzers/header-fuzzers/unsupported-accept.md b/docs/fuzzers/header-fuzzers/unsupported-accept.md
index 29b2ca5da..5185399f9 100644
--- a/docs/fuzzers/header-fuzzers/unsupported-accept.md
+++ b/docs/fuzzers/header-fuzzers/unsupported-accept.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | UnsupportedAcceptHeadersFuzzer |
-| **Log Key** | **UAHF** |
+| **Log Key** | **UAH** |
| **Description** | This fuzzer will send different `Accept` headers from a pre-defined list. The Fuzzer will send happy path requests. The expectation is that APIs will reject requests as not supported. |
| **Enabled by default?** | Yes |
| **Target header types** | All |
diff --git a/docs/fuzzers/header-fuzzers/unsupported-content-type.md b/docs/fuzzers/header-fuzzers/unsupported-content-type.md
index a066faf9f..4ca743c9b 100644
--- a/docs/fuzzers/header-fuzzers/unsupported-content-type.md
+++ b/docs/fuzzers/header-fuzzers/unsupported-content-type.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | UnsupportedContentTypesHeadersFuzzer |
-| **Log Key** | **UCTHF** |
+| **Log Key** | **UCTH** |
| **Description** | This fuzzer will send different `Content-Type` headers from a pre-defined list. The Fuzzer will send happy path requests. The expectation is that APIs will reject requests as not supported. |
| **Enabled by default?** | Yes |
| **Target header types** | All |
diff --git a/docs/fuzzers/header-fuzzers/very-large-strings.md b/docs/fuzzers/header-fuzzers/very-large-strings.md
index 7e5bbaf8b..7ec2daa68 100644
--- a/docs/fuzzers/header-fuzzers/very-large-strings.md
+++ b/docs/fuzzers/header-fuzzers/very-large-strings.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | VeryLargeStringsInHeadersFuzzer |
-| **Log Key** | **VLSIHF** |
+| **Log Key** | **VLSIH** |
| **Description** | This fuzzer will send very large strings in headers. The expectation is that APIs will reject the request as invalid as they might potentially break downstream systems. Furthermore, APIs should update their specs to define clear boundaries (`minimum`, `maximum`, `minLength`, `maxLength`). |
| **Enabled by default?** | Yes |
| **Target header types** | All |
diff --git a/docs/fuzzers/header-fuzzers/very-large-unicodes.md b/docs/fuzzers/header-fuzzers/very-large-unicodes.md
index a2f96e9ae..b0bfe0997 100644
--- a/docs/fuzzers/header-fuzzers/very-large-unicodes.md
+++ b/docs/fuzzers/header-fuzzers/very-large-unicodes.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | VeryLargeUnicodeStringsInHeadersFuzzer |
-| **Log Key** | **VLUSIHF** |
+| **Log Key** | **VLUSIH** |
| **Description** | This fuzzer will send very large strings with random Unicode characters in headers. The expectation is that APIs will reject the request as invalid as they might potentially break downstream systems. Furthermore, APIs should update their specs to define clear boundaries (`minimum`, `maximum`, `minLength`, `maxLength`). |
| **Enabled by default?** | Yes |
| **Target header types** | All |
diff --git a/docs/fuzzers/header-fuzzers/zalgo-text.md b/docs/fuzzers/header-fuzzers/zalgo-text.md
index 73d21d273..d1a086d15 100644
--- a/docs/fuzzers/header-fuzzers/zalgo-text.md
+++ b/docs/fuzzers/header-fuzzers/zalgo-text.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | ZalgoTextInHeadersFuzzer |
-| **Log Key** | **ZTIHF** |
+| **Log Key** | **ZTIH** |
| **Description** | This fuzzer replaces headers with [zalgo text](https://en.wikipedia.org/wiki/Zalgo_text). The expectation is that APIs will reject the request as invalid, as these characters should not be present in headers. |
| **Enabled by default?** | Yes |
| **Target header types** | All |
diff --git a/docs/fuzzers/http-fuzzers/bypass-authentication.md b/docs/fuzzers/http-fuzzers/bypass-authentication.md
index 90f77fd52..638b5f2bd 100644
--- a/docs/fuzzers/http-fuzzers/bypass-authentication.md
+++ b/docs/fuzzers/http-fuzzers/bypass-authentication.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:---------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | BypassAuthenticationFuzzer |
-| **Log Key** | **BAHF** |
+| **Log Key** | **BAH** |
| **Description** | This fuzzer removes any authentication headers from the requests. The expectation is that APIs will reject the request as unauthorized or forbidden. |
| **Enabled by default?** | Yes |
| **Expected result** | `401` or `403` |
diff --git a/docs/fuzzers/http-fuzzers/check-deleted.md b/docs/fuzzers/http-fuzzers/check-deleted.md
index d6f062aaa..7e9bcf69b 100644
--- a/docs/fuzzers/http-fuzzers/check-deleted.md
+++ b/docs/fuzzers/http-fuzzers/check-deleted.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:------------------------------------------------|:-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | CheckDeletedResourcesNotAvailableFuzzer |
-| **Log Key** | **CDRNAF** |
+| **Log Key** | **CDRNA** |
| **Description** | This fuzzer checks that deleted resources are not available anymore. The expectation is that a successful `DELETE` (`2XX`) will make a `GET` return a `404` or `410`. The Fuzzer will run last, after all the other Fuzzers. |
| **Enabled by default?** | Yes |
| **Expected result** | `404` or `410`. |
diff --git a/docs/fuzzers/http-fuzzers/dummy-request.md b/docs/fuzzers/http-fuzzers/dummy-request.md
index f920927d8..46dbd1254 100644
--- a/docs/fuzzers/http-fuzzers/dummy-request.md
+++ b/docs/fuzzers/http-fuzzers/dummy-request.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | DummyRequestFuzzer |
-| **Log Key** | **DRF** |
+| **Log Key** | **DR** |
| **Description** | This fuzzer will send a dummy request. The expectation is that APIs will reject the request in order to prevent injection attacks. |
| **Enabled by default?** | Yes |
| **Expected result** | `4XX` |
diff --git a/docs/fuzzers/http-fuzzers/empty-body.md b/docs/fuzzers/http-fuzzers/empty-body.md
index 91277b3e7..6ecb0dfd5 100644
--- a/docs/fuzzers/http-fuzzers/empty-body.md
+++ b/docs/fuzzers/http-fuzzers/empty-body.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | EmptyBodyFuzzer |
-| **Log Key** | **EBF** |
+| **Log Key** | **EB** |
| **Description** | This fuzzer will send a request with a empty "" body. The expectation is that APIs will reject the request as invalid. |
| **Enabled by default?** | Yes |
| **Expected result** | `4XX` |
diff --git a/docs/fuzzers/http-fuzzers/empty-json.md b/docs/fuzzers/http-fuzzers/empty-json.md
index 0e8ec5fb3..e0ad98216 100644
--- a/docs/fuzzers/http-fuzzers/empty-json.md
+++ b/docs/fuzzers/http-fuzzers/empty-json.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | EmptyJsonBodyFuzzer |
-| **Log Key** | **EJB** |
+| **Log Key** | **EJ** |
| **Description** | This fuzzer will send a request with a empty `{}` body. The expectation is that APIs will reject the request as invalid. |
| **Enabled by default?** | Yes |
| **Expected result** | `4XX` |
diff --git a/docs/fuzzers/http-fuzzers/happy-path.md b/docs/fuzzers/http-fuzzers/happy-path.md
index 177145990..decd48ff3 100644
--- a/docs/fuzzers/http-fuzzers/happy-path.md
+++ b/docs/fuzzers/http-fuzzers/happy-path.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | HappyPathFuzzer |
-| **Log Key** | **HPF** |
+| **Log Key** | **HP** |
| **Description** | This fuzzer will send a happy path request. The expectation is that APIs will respond with a `2XX`. |
| **Enabled by default?** | Yes |
| **Expected result** | `2XX` |
diff --git a/docs/fuzzers/http-fuzzers/http-methods.md b/docs/fuzzers/http-fuzzers/http-methods.md
index 0e0fbb7f6..2cccd2296 100644
--- a/docs/fuzzers/http-fuzzers/http-methods.md
+++ b/docs/fuzzers/http-fuzzers/http-methods.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | HttpMethodsFuzzer |
-| **Log Key** | **HMF** |
+| **Log Key** | **HM** |
| **Description** | This fuzzer will send happy path requests for methods not documented in the OpenAPI spec. The expectation is that APIs will reject the request. |
| **Enabled by default?** | Yes |
| **Expected result** | `405` |
diff --git a/docs/fuzzers/http-fuzzers/malformed-json.md b/docs/fuzzers/http-fuzzers/malformed-json.md
index 16832a546..e3c86e578 100644
--- a/docs/fuzzers/http-fuzzers/malformed-json.md
+++ b/docs/fuzzers/http-fuzzers/malformed-json.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | MalformedJsonFuzzer |
-| **Log Key** | **MJF** |
+| **Log Key** | **MJ** |
| **Description** | This fuzzer will send a request with an invalid JSON. The expectation is that APIs reject the request as invalid. |
| **Enabled by default?** | Yes |
| **Expected result** | `4XX` |
diff --git a/docs/fuzzers/http-fuzzers/non-rest-methods.md b/docs/fuzzers/http-fuzzers/non-rest-methods.md
index 72a74ca47..34d0e967a 100644
--- a/docs/fuzzers/http-fuzzers/non-rest-methods.md
+++ b/docs/fuzzers/http-fuzzers/non-rest-methods.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | NonRestHttpMethodsFuzzer |
-| **Log Key** | **NRHMF** |
+| **Log Key** | **NRHM** |
| **Description** | This fuzzer will send happy path requests for HTTP methods not specific to REST APIs. The expectation is that APIs will reject the request. |
| **Enabled by default?** | Yes |
| **Expected result** | `405` |
diff --git a/docs/fuzzers/http-fuzzers/null-body.md b/docs/fuzzers/http-fuzzers/null-body.md
index 2d44fac36..3ff9e91f4 100644
--- a/docs/fuzzers/http-fuzzers/null-body.md
+++ b/docs/fuzzers/http-fuzzers/null-body.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | NullBodyFuzzer |
-| **Log Key** | **NBF** |
+| **Log Key** | **NB** |
| **Description** | This fuzzer will send a request with a `null` body. The expectation is that APIs will reject the request as invalid. |
| **Enabled by default?** | Yes |
| **Expected result** | `4XX` |
diff --git a/docs/fuzzers/http-fuzzers/random-negative-decimal.md b/docs/fuzzers/http-fuzzers/random-negative-decimal.md
index b401c14c9..6f804c365 100644
--- a/docs/fuzzers/http-fuzzers/random-negative-decimal.md
+++ b/docs/fuzzers/http-fuzzers/random-negative-decimal.md
@@ -6,7 +6,7 @@ hide_table_of_contents: true
| Item | Description |
|:------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
-| **Full Fuzzer Name** | RandomNegativeDecimalBody |
+| **Full Fuzzer Name** | RandomNegativeDecimalBodyFuzzer |
| **Log Key** | **RNDB** |
| **Description** | This fuzzer will send a request with a random negative decimal body. The expectation is that APIs will reject the request as invalid. |
| **Enabled by default?** | Yes |
diff --git a/docs/fuzzers/http-fuzzers/random-negative-integer.md b/docs/fuzzers/http-fuzzers/random-negative-integer.md
index 9167dfbf0..d57f9d420 100644
--- a/docs/fuzzers/http-fuzzers/random-negative-integer.md
+++ b/docs/fuzzers/http-fuzzers/random-negative-integer.md
@@ -6,7 +6,7 @@ hide_table_of_contents: true
| Item | Description |
|:------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
-| **Full Fuzzer Name** | RandomNegativeIntegerBody |
+| **Full Fuzzer Name** | RandomNegativeIntegerBodyFuzzer |
| **Log Key** | **RNIB** |
| **Description** | This fuzzer will send a request with a random negative integer body. The expectation is that APIs will reject the request as invalid. |
| **Enabled by default?** | Yes |
diff --git a/docs/fuzzers/http-fuzzers/random-positive-decimal.md b/docs/fuzzers/http-fuzzers/random-positive-decimal.md
index 5a337d1d3..fd3739e19 100644
--- a/docs/fuzzers/http-fuzzers/random-positive-decimal.md
+++ b/docs/fuzzers/http-fuzzers/random-positive-decimal.md
@@ -6,7 +6,7 @@ hide_table_of_contents: true
| Item | Description |
|:------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
-| **Full Fuzzer Name** | RandomPositiveDecimalBody |
+| **Full Fuzzer Name** | RandomPositiveDecimalBodyFuzzer |
| **Log Key** | **RPDB** |
| **Description** | This fuzzer will send a request with a random positive decimal body. The expectation is that APIs will reject the request as invalid. |
| **Enabled by default?** | Yes |
diff --git a/docs/fuzzers/http-fuzzers/random-positive-integer.md b/docs/fuzzers/http-fuzzers/random-positive-integer.md
index 426a0a2bb..627adf867 100644
--- a/docs/fuzzers/http-fuzzers/random-positive-integer.md
+++ b/docs/fuzzers/http-fuzzers/random-positive-integer.md
@@ -7,7 +7,7 @@ hide_table_of_contents: true
| Item | Description |
|:------------------------------------------------|:--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **Full Fuzzer Name** | RandomPositiveIntegerBody |
-| **Log Key** | **RPDB** |
+| **Log Key** | **RPIB** |
| **Description** | This fuzzer will send a request with a random positive integer body. The expectation is that APIs will reject the request as invalid. |
| **Enabled by default?** | Yes |
| **Expected result** | `4XX` |