Hello Charles,
I think it's specific to the particular installation, which loadmodules could be assigned to which element types, systems etc. Therefore, a general solution might be difficult to create.
Just from the top of my head two possible approaches:
(1) You can write the footprint exception report to disk, select the C1R020W-member-lines, and transform them into LIST ELEMENT statements. You can do this for example by a rexx or a SORT-step. You can add "static parts" of the element-key like ENV, STAGE, TYPE, SYS, SUB as SET-commands in front of the "generated" LIST-statements and execute the whole as batchjob against your Endevor-site. LIST-Statements resulting in RC=4 would indicate a missing element-source.
(2) You can transform the member names of the footprint violation report into a flat file (again using rexx, SORT or similar). Then you can extract the relevant *) Element-names from your Endevor-site using CSV-Utility, also creating a flat file. By comparing these two flat files you can identify members without element-names.
*) relevant: I mean, it would make sense, only to extract those element types which could result in a load-module, a copybook and a loadmodule with the same name is definitely an exposure, although an element exists.
I guess, that in the meantime you have implemented security, that only Endevor (alternate Userid) is allowed to add, modify or delete loadmodules in your Endevor-controlled loadlibs and compiles outside of Endevor result in a separate loadlib.
Kind regards,
Josef