From asi
Use AddressSanitizer to detect memory safety bugs in C/C++ programs. Identifies use-after-free, buffer overflow, memory leaks, and other memory errors.
npx claudepluginhub plurigrid/asi --plugin asiThis skill uses the workspace's default tool permissions.
**Trit**: -1 (MINUS)
Detects missing zeroization of sensitive data in source code and identifies zeroization removed by compiler optimizations, with assembly-level analysis, and control-flow verification. Use for auditing C/C++/Rust code handling secrets, keys, passwords, or other sensitive data.
Audits C/C++/Rust code for missing zeroization of sensitive data and compiler optimizations removing wipes, using assembly, IR, and control-flow analysis. For secrets-handling security reviews.
Audits C/C++/Rust code for missing zeroization of secrets/keys/passwords and compiler optimizations removing wipes, using assembly analysis and control-flow verification.
Share bugs, ideas, or general feedback.
Trit: -1 (MINUS) Category: testing-handbook-skills Author: Trail of Bits Source: trailofbits/skills License: AGPL-3.0
Use AddressSanitizer to detect memory safety bugs in C/C++ programs. Identifies use-after-free, buffer overflow, memory leaks, and other memory errors.
This is a Trail of Bits security skill. Refer to the original repository for detailed usage guidelines and examples.
See: https://github.com/trailofbits/skills