Blog Security How to secure memory-safe vs. manually managed languages
Published on: March 14, 2023
9 min read

How to secure memory-safe vs. manually managed languages

Learn how GitLab reduces source code risk using scanning, vulnerability management, and other key features.


The National Security Agency (NSA) has published an executive summary showcasing the risk of using manually managed languages over memory-safe languages in application development. Manual memory management may introduce major bugs and security risks into your application if the memory is managed incorrectly.

Security bugs introduced by manually managed languages can be catastrophic to the function of the application, as well as the information contained in the application. These bugs may cause performance slowdowns, application crashes, remote code execution, information leakage, and system failures.

Bugs that may be introduced include the following:

  • Memory leak: Memory no longer being used is not released, which reduces the amount of available memory.
  • Buffer overflow: Overwriting of memory locations adjacent to a buffers boundary.
  • Segmentation fault: An application tries to access a restricted piece of memory.
  • Wild pointers: Pointer points to the memory which has been deallocated.
  • Undefined behavior: An application with unpredictable behavior.

To provide some insight on the prevalance of risk introduced by manually managed languages, Microsoft revealed that within the span of 12 years, 70% of their vulnerabilities were due to mismanagement of memory. Google reported that there was a similar percentage of vulnerabilities introduced by memory safety violations within the Chrome browser.

All these vulnerabilities can be exploited by malicious actors who may compromise a device, potentially leading to a compromise of a larger network infrastructure. With this large risk presented by mismanaged memory, the NSA advises organizations to consider using memory-safe languages wherever possible and providing mechanisms to harden applications built with manually managed languages.

Memory-safe languages vs. manually managed languages

A memory-safe language is a language where memory allocation and garbage collection are abstracted away from the developer and handled by the programming language itself. These languages include Python, Java, and Go, to name a few.

In contrast, manually managed languages provide a developer with full control over the system memory (with some exceptions). The most popular manually managed languages are C and C++.

Each language type has a purpose and use case. There are times when a memory-safe language is recommended, but there are also times when it may not suit the application requirements.

Below is a list of some pros and cons of each language type:

Language type Pros Cons
Memory safe Memory mangement abstracted from developer, reduced risk of memory errors Reduced efficency/performance, unpredictable garbage collection
Manually managed Enhanced efficency/performance, no garbage collection overhead Prone to memory-related failures

Manually managed languages provide the developer with more power, but also introduce a greater amount of risk, so they should only be used where required.

Memory 'unsafe' language security scanning

Although many organizations are promoting the use of memory-safe languages vs. manually managed ones, it is unrealistic to remove manually managed languages from a developer's toolbox. Therefore, developers must get ahead of all the bugs/vulnerabilities that may be introduced. This can be done by scanning application source code.

GitLab supports various scanners for memory-unsafe languages. Below you can see the scanners used for C and C++:

Language Scanners
C Semgrep with GitLab-managed rules
C++ Flawfinder

Now let's take a look at how GitLab's static application security testing (SAST) allows us to find and resolve vulnerabilities. Below is an application which doesn't crash, but may generate unexpected behavior:

#include <stdio.h>

int main()
  char msg[5] = "Hello";

  /* Add exclamation, to a position that doesn't exist*/
  msg[8] = '!';

  /* print each letter 1 by 1 */
  /* Notice we are going further than the length of the array */
  int i;
  for (i = 0; i < 10; ++i)
    printf("%i: %c \n", i, msg[i]);

  return 0;

When running the GitLab SAST scanner, the vulnerability is detected and a solution is provided:

GitLab SAST scanner results

It shows you need to perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. You can also see the CWE for more information on how the system may be impacted. Note that vulnerabilities are actionable. These actions include the ability to dismiss a vulnerability and add additional information for the security team to review, or a confidential issue can be created for review.

These scanners allow DevSecOps teams to resolve security issues before code makes it into production and safeguard their application from memory issues. Note that not all memory issues are easily detected due to the nature of manual memory management. Therefore, it is also important to add unit tests, fuzzing, and run checks using the GitLab CI to further ensure the reliability and security of your application.

The following applications contain examples of creating a GitLab pipeline for C applications:

Memory-safe language security scanning

As more developers move to memory-safe languages, it is important that the tools used to prevent vulnerabilities support these languages as well. GitLab provides a rich feature set for securing application source code, especially for memory-safe languages.

Below is a table of some the popular languages GitLab supports. To see the full list, visit the GitLab SAST Language/Framework Support page.

Language Scanners
Python Semgrep with GitLab-managed rules, Bandit
Go Semgrep with GitLab-managed rules, GoSec
Java Semgrep with GitLab-managed rules, SpotBugs with the find-sec-bugs plugin, MobSF (beta)
JavaScript Semgrep with GitLab-managed rules, ESLint security plugin
Ruby brakeman

GitLab uses a mix of open source tools developed in-house as well as commonly used tools within the open source community. It is important to note that GitLab's security research team creates custom rules to better reduce false positives as well as enhance the number of vulnerabilities found.

Here are some Python functions, which can be exploited and then data can be obtained via SQL injection:

def select_note_by_id(conn, id=None, admin=False):
   query = "SELECT id, data FROM notes WHERE secret IS FALSE"
   cur = conn.cursor()

   # Admin doesn't have search by id function, since only used in the UI
   if admin:
       query = "SELECT id, data, ipaddress, hostname, secret FROM notes"

   if id:
       if admin:
           query = query + " WHERE id = %s" % id
           # NOTE: Vulnerable to SQL injection, can get secret notes
           # by adding 'OR 1=1', since not parameterized
           query = query + " AND id = %s" % id

   except Exception as e:
       note.logger.error("Error: cannot select note by id - %s" % e)

   allItems = cur.fetchall()

   if len(allItems) == 0:
       return []

   return allItems

When running the GitLab SAST scanner, you can see the SQL injection vulnerability is detected. A solution is provided with the line of code affected as well as identifiers that provide more information on how the CWE can affect your system.

SQL Injection and solution

Notice that there is also training to enable developers to understand the vulnerability and how it can be exploited, and to make them more security-aware.

Other application attack vectors

Using a memory-safe language along with a SAST scanner reduces vulnerability risk, but there are more attack vectors to consider, including configurations, infrastructure, and dependencies. This is why it is important to scan all aspects of your application.

GitLab offers the following scanners to help you achieve full coverage:

Scanner type Description
Dynamic application security testing (DAST) Examines applications for vulnerabilities like these in deployed environments.
Infrastructure as code (IaC) scanning Scans your IaC (Terraform, Ansible, AWS CloudFormation, Kubernetes, etc.) configuration files for known vulnerabilities.
Dependency scanning Finds security vulnerabilities in your software dependencies.
Container scanning Scans your applications container images for known vulnerabilities.
License scanning - CycloneDX Capable of parsing and identifying over 500 different types of licenses and can extract license information from packages that are dual-licensed or have multiple different licenses that apply.
Secret detection Scans your repository for secrets.
Coverage-guided fuzzing Sends random inputs to an instrumented version of your application in an effort to cause unexpected behavior.
Web API fuzzing Sets operation parameters to unexpected values in an effort to cause unexpected behavior and errors in the API backend.

Aside from full scanner coverage, it important to add guardrails to prevent vulnerable code from compromising a production environment. This can be done by requiring approval from the security team for merging any code with vulnerabilities using GitLab policies.

To get started using these tools and more, check out the GitLab Application Security page. It's as simple as signing up for GitLab Ultimate and adding some templates to your .gitlab-ci.yml.

Managing vulnerabilities of all types

Although we can find and address vulnerabilities before they make it into production, it is not possible to eliminate all risk. This is why it is important to be able to assess the security posture of your project or group of projects.

For this, GitLab provides Vulnerability Reports, which allow you to manage and triage vulnerabilities within the main branch of the application. You can sort through all the vulnerabilities for a project or group of projects using a variety of different criteria.

Vulnerability report screenshot

Clicking on a vulnerability sends you to its Vulnerability Page. There you can review details on the vulnerability, manage its status, collaborate with other members of the security team, as well as create confidential issues to assign to developers.

Vulnerability Page

Thanks for reading! To learn more about available Security features, check out GitLab's application security documentation and get started securing your application today. You can also sign up for a 30-day free GitLab Ultimate trial and test the Simple Notes Application, which contains a full tutorial on getting started with implementing and using many of GitLab's security features.


Below are some references used in this blog:

Cover image by Mohammad Rahmani on Unsplash

We want to hear from you

Enjoyed reading this blog post or have questions or feedback? Share your thoughts by creating a new topic in the GitLab community forum. Share your feedback

Ready to get started?

See what your team could do with a unified DevSecOps Platform.

Get free trial

New to GitLab and not sure where to start?

Get started guide

Learn about what GitLab can do for your team

Talk to an expert