Stensal™ SDK

Retrofit C/C++ code with quasi-memory-safety

Free for open source projects

Features our users love

Detecting the following illegal memory accesses with informative messages for quickly fixing bugs
  • Out-of-bounds array access
  • Use-after-free
  • Double free
  • Constant data corruption
  • Uninitialized memory read

Does your C/C++ code have unexpected behavior?

Detecting illegal memory accesses has never been so easy

  1. Build with the Stensal SDK :
  2. Deploy and Use
  3. Collect

Comparision with other memory error finding tools

Stensal SDK Address Sanitizer* Valgrind**
Detecting memory access violations
Out-of-bounds access of stack-allocated array +++ + -
Out-of-bounds access of heap-allocated array +++ + +
Out-of-bounds access of global array +++ - -
Null (and uninitialized) pointer dereference +++ +++ +++
Use-after-free (stack-allocated) ++ - -
Use-after-free (heap-allocated) ++ - +
Double free ++ + +
Error Reporting
Report the cause +++ + +
Report source location +++ + +
Report backtrace +++ + +
Linking type supported
Static linking
Dynamic linking

+++always, ++very high probability, +most times, -never, and ✔ supported
* clang-7.0.0; ** valgrind-3.10