CtrlK
BlogDocsLog inGet started
Tessl Logo

address-sanitizer

AddressSanitizer detects memory errors during fuzzing. Use when fuzzing C/C++ code to find buffer overflows and use-after-free bugs.

77

1.39x
Quality

70%

Does it follow best practices?

Impact

85%

1.39x

Average score across 3 eval scenarios

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./plugins/testing-handbook-skills/skills/address-sanitizer/SKILL.md
SKILL.md
Quality
Evals
Security

Evaluation results

90%

45%

Fuzz Harness for a C URI Parser Library

libFuzzer ASan integration

Criteria
Without context
With context

Fuzzer+ASan flags together

100%

100%

Debug symbols flag

100%

100%

abort_on_error option

0%

100%

Leak detection disabled

0%

100%

RSS limit disabled

0%

100%

ASan in both compile and link

100%

100%

LLVMFuzzerTestOneInput present

100%

100%

uri_parse called in harness

100%

100%

ASAN_OPTIONS colon separator

0%

100%

No ASan in production note

0%

0%

90%

25%

AFL++ Fuzzing Campaign for a Network Packet Decoder

AFL++ ASan integration

Criteria
Without context
With context

AFL_USE_ASAN during compile

100%

100%

Memory limit disabled in run

100%

100%

Debug symbols in build

100%

100%

AFL++ compiler wrapper used

100%

100%

ASAN_OPTIONS configured

0%

100%

abort_on_error set

0%

100%

Input/output dirs in run

100%

100%

No production ASan warning

0%

0%

75%

C Library Test Suite Makefile with Sanitizer Support

ASan compile and runtime configuration

Criteria
Without context
With context

ASan compile flag

100%

100%

Debug symbols flag

100%

100%

Combined UBSan

100%

0%

Optimization flag

0%

0%

verbosity=1 in ASAN_OPTIONS

0%

100%

ASAN_OPTIONS colon separator

100%

100%

Production build clean

100%

100%

ASan in both compile and link

100%

100%

README explains no-production

100%

100%

Repository
trailofbits/skills
Evaluated
Agent
Claude Code
Model
Claude Sonnet 4.6

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.