AddressSanitizer
Skill AktivAddressSanitizer detects memory errors during fuzzing. Use when fuzzing C/C++ code to find buffer overflows and use-after-free bugs.
To enable developers to effectively use AddressSanitizer for finding memory corruption bugs in C/C++ code during fuzzing and testing.
Funktionen
- Detects memory errors like buffer overflows and use-after-free
- Integrates with C/C++ compilation toolchains (Clang/GCC)
- Configurable runtime options via environment variables
- Provides step-by-step integration guides for fuzzers (libFuzzer, AFL++, cargo-fuzz)
- Includes troubleshooting for common ASan issues
Anwendungsfälle
- Fuzzing C/C++ code to find memory safety vulnerabilities
- Debugging crashes related to memory corruption
- Enhancing unit test suites with memory error detection
- Improving the security posture of C/C++ projects
Nicht-Ziele
- Applying ASan in production environments due to performance overhead
- Fuzzing pure safe languages without FFI or platforms with limited ASan support (Windows, macOS)
- Replacing fundamental fuzzing techniques or harness writing
- Detecting non-memory-related bugs
Workflow
- Compile C/C++ code with AddressSanitizer flags (`-fsanitize=address`)
- Configure ASan runtime behavior using `ASAN_OPTIONS` environment variable
- Run the instrumented program or fuzzer
- Analyze ASan's detailed error reports when memory errors are detected
- Adjust fuzzer memory limits if necessary for ASan's virtual memory requirements
Trust
- warning:Issues Attention13 issues opened, 4 closed in the last 90 days, indicating a low closure rate and slow maintainer response.
Installation
Zuerst Marketplace hinzufügen
/plugin marketplace add trailofbits/skills/plugin install testing-handbook-skills@trailofbitsQualitätspunktzahl
Vertrauenssignale
Ähnliche Erweiterungen
LibFuzzer
95Coverage-guided fuzzer built into LLVM for C/C++ projects. Use for fuzzing C/C++ code that can be compiled with Clang.
AFL++ Fuzzer
95AFL++ is a fork of AFL with better fuzzing performance and advanced features. Use for multi-core fuzzing of C/C++ projects.
Use My Browser
100Verwenden Sie dies, wenn die Arbeit von den Live-Browsersitzungs- oder gerenderten Zustand des Benutzers abhängt und nicht von statischen Abrufen, insbesondere für Browser-Debugging-Kontexte oder von DevTools ausgewählte Elemente oder Anfragen, angemeldeten Dashboards oder CMS-Flows, localhost-Apps, Formularen, Uploads, Downloads, Medieninspektion, DOM- oder iframe-Inspektion, Shadow DOM oder Browserfehlern, die wie Soft-404s, Authentifizierungswände, Anti-Bot-Prüfungen oder Ratenbegrenzungen aussehen.
Node Connect
100Diagnose OpenClaw Android, iOS, or macOS node pairing, QR/setup code, route, auth, and connection failures.
Openclaw Debugging
100Debug OpenClaw model, provider, tool-surface, code-mode, streaming, and live/Crabbox behavior by choosing the right logs, probes, and proof path before changing code.
Ctx Doctor
100Führt Diagnosen für den Kontextmodus aus. Überprüft Laufzeiten, Hooks, FTS5, Plugin-Registrierung sowie npm- und Marktplatzversionen. Auslöser: /context-mode:ctx-doctor