AddressSanitizer detects memory errors during fuzzing. Use when fuzzing C/C++ code to find buffer overflows and use-after-free bugs.
77
70%
Does it follow best practices?
Impact
85%
1.39xAverage score across 3 eval scenarios
Passed
No known issues
Optimize this skill with Tessl
npx tessl skill review --optimize ./plugins/testing-handbook-skills/skills/address-sanitizer/SKILL.mdlibFuzzer ASan integration
Fuzzer+ASan flags together
100%
100%
Debug symbols flag
100%
100%
abort_on_error option
0%
100%
Leak detection disabled
0%
100%
RSS limit disabled
0%
100%
ASan in both compile and link
100%
100%
LLVMFuzzerTestOneInput present
100%
100%
uri_parse called in harness
100%
100%
ASAN_OPTIONS colon separator
0%
100%
No ASan in production note
0%
0%
AFL++ ASan integration
AFL_USE_ASAN during compile
100%
100%
Memory limit disabled in run
100%
100%
Debug symbols in build
100%
100%
AFL++ compiler wrapper used
100%
100%
ASAN_OPTIONS configured
0%
100%
abort_on_error set
0%
100%
Input/output dirs in run
100%
100%
No production ASan warning
0%
0%
ASan compile and runtime configuration
ASan compile flag
100%
100%
Debug symbols flag
100%
100%
Combined UBSan
100%
0%
Optimization flag
0%
0%
verbosity=1 in ASAN_OPTIONS
0%
100%
ASAN_OPTIONS colon separator
100%
100%
Production build clean
100%
100%
ASan in both compile and link
100%
100%
README explains no-production
100%
100%
d7f76b5
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.