·sanitizers

Compiler sanitizer skill for runtime bug detection in C/C++. Use when enabling and interpreting AddressSanitizer (ASan), UndefinedBehaviorSanitizer (UBSan), ThreadSanitizer (TSan), MemorySanitizer (MSan), or LeakSanitizer (LSan) with GCC or Clang. Activates on queries about sanitizer flags, sanitizer reports, ASAN_OPTIONS, memory errors, data races, undefined behaviour, uninitialised reads, or choosing which sanitizer to use for a given bug class.

26Installs·1Trend·@mohitmishra786

Installation

$npx skills add https://github.com/mohitmishra786/low-level-dev-skills --skill sanitizers

How to Install sanitizers

Quickly install sanitizers AI skill to your development environment via command line

  1. Open Terminal: Open your terminal or command line tool (Terminal, iTerm, Windows Terminal, etc.)
  2. Run Installation Command: Copy and run this command: npx skills add https://github.com/mohitmishra786/low-level-dev-skills --skill sanitizers
  3. Verify Installation: Once installed, the skill will be automatically configured in your AI coding environment and ready to use in Claude Code, Cursor, or OpenClaw

Source: mohitmishra786/low-level-dev-skills.

SKILL.md

View raw

Guide agents through choosing, enabling, and interpreting compiler runtime sanitizers for finding memory errors, undefined behaviour, data races, and memory leaks.

| detectleaks=0/1 | Enable LeakSanitizer (default 1 on Linux) | | abortonerror=1 | Call abort() instead of exit() (for core dumps) | | logpath=path | Write report to file | | symbolize=1 | Symbolize addresses (needs llvm-symbolizer in PATH) | | fastunwindonmalloc=0 | More accurate stacks (slower) | | quarantinesizemb=256 | Delay reuse of freed memory |

Reading: the top frame in WRITE/READ is the access site; the allocated at stack shows the allocation. The region is 40 bytes at [start, end) and the access is at end = one byte past the end (classic off-by-one).

Compiler sanitizer skill for runtime bug detection in C/C++. Use when enabling and interpreting AddressSanitizer (ASan), UndefinedBehaviorSanitizer (UBSan), ThreadSanitizer (TSan), MemorySanitizer (MSan), or LeakSanitizer (LSan) with GCC or Clang. Activates on queries about sanitizer flags, sanitizer reports, ASAN_OPTIONS, memory errors, data races, undefined behaviour, uninitialised reads, or choosing which sanitizer to use for a given bug class. Source: mohitmishra786/low-level-dev-skills.

Facts (cite-ready)

Stable fields and commands for AI/search citations.

Install command
npx skills add https://github.com/mohitmishra786/low-level-dev-skills --skill sanitizers
Category
{}Data Analysis
Verified
First Seen
2026-02-22
Updated
2026-03-10

Browse more skills from mohitmishra786/low-level-dev-skills

Quick answers

What is sanitizers?

Compiler sanitizer skill for runtime bug detection in C/C++. Use when enabling and interpreting AddressSanitizer (ASan), UndefinedBehaviorSanitizer (UBSan), ThreadSanitizer (TSan), MemorySanitizer (MSan), or LeakSanitizer (LSan) with GCC or Clang. Activates on queries about sanitizer flags, sanitizer reports, ASAN_OPTIONS, memory errors, data races, undefined behaviour, uninitialised reads, or choosing which sanitizer to use for a given bug class. Source: mohitmishra786/low-level-dev-skills.

How do I install sanitizers?

Open your terminal or command line tool (Terminal, iTerm, Windows Terminal, etc.) Copy and run this command: npx skills add https://github.com/mohitmishra786/low-level-dev-skills --skill sanitizers Once installed, the skill will be automatically configured in your AI coding environment and ready to use in Claude Code, Cursor, or OpenClaw

Where is the source repository?

https://github.com/mohitmishra786/low-level-dev-skills

Details

Category
{}Data Analysis
Source
skills.sh
First Seen
2026-02-22