Evaluate stack guard implementation(s)

Right now we have at least three ways to ensure stack-smash does not happen.

Could GCC implementation supplement both StackThunk and CONT? Or, replace it? (see __attribute__ above)
Should CONT checks randomize its guard value to separate stack contents themselves from structure guard members?
Could we add something like address sanitizer that verifies that we don't go over the stack boundaries, not just protect us from writing things over one specific u32 value?
w