Contrast Security announced on Monday the availability of a free plugin that allows software developers to easily find vulnerabilities in their applications.
Contrast for Eclipse seamlessly integrates with the Eclipse Java Integrated Development Environment (IDE). The tool, powered by Contrast’s patented instrumentation technology, provides accurate and automatic detection of OWASP top 10 vulnerabilities, and it instantly informs developers on the exact location of the flaw in the source code.
The list of features also includes detailed run-time code and data flow analysis, andcontext-sensitive remediation tips. Contrast for Eclipse is designed to analyze both custom code and libraries, the company said.
According to the application security software provider, over 22 vulnerabilities make it into an application’s final release due to the lack of application security. Most organizations secure only a small percentage of their solutions because legacy static application security testing (SAST) and dynamic application security testing (DAST) tools are ineffective, and because manual code review is costly.
By using the new plugin, developers no longer have to worry about manually reviewing their code or tracking false positives, the firm said.
The company warns that attacks against applications can lead to security breaches that traditional network perimeter protection solutions are unable to detect.
“We believe in a future free of software vulnerabilities – that is our mission,” said Jeff Williams, founder and CTO of Contrast Security. “In bringing Contrast for Eclipse to market, we’re giving developers the control they need to quickly and easily eliminate application vulnerabilities at the source. There is no reason to ever have another SQL injection attack – yes, you read that right. Developers should be empowered with great tools that make security easy, and this conviction is the impetus behind Contrast for Eclipse.”
Contrast Security says its team is conducting a number of trainings on Contrast for Eclipse to help developers be more informed on application vulnerabilities.