Contrast Security announced on Monday the availability of a free plugin that allows software developers to easily find vulnerabilities in their applications.
Contrast for Eclipse seamlessly integrates with the Eclipse Java Integrated Development Environment (IDE). The tool, powered by Contrast’s patented instrumentation technology, provides accurate and automatic detection of OWASP top 10 vulnerabilities, and it instantly informs developers on the exact location of the flaw in the source code.
The list of features also includes detailed run-time code and data flow analysis, andcontext-sensitive remediation tips. Contrast for Eclipse is designed to analyze both custom code and libraries, the company said.
According to the application security software provider, over 22 vulnerabilities make it into an application’s final release due to the lack of application security. Most organizations secure only a small percentage of their solutions because legacy static application security testing (SAST) and dynamic application security testing (DAST) tools are ineffective, and because manual code review is costly.
By using the new plugin, developers no longer have to worry about manually reviewing their code or tracking false positives, the firm said.
The company warns that attacks against applications can lead to security breaches that traditional network perimeter protection solutions are unable to detect.
“We believe in a future free of software vulnerabilities – that is our mission,” said Jeff Williams, founder and CTO of Contrast Security. “In bringing Contrast for Eclipse to market, we’re giving developers the control they need to quickly and easily eliminate application vulnerabilities at the source. There is no reason to ever have another SQL injection attack – yes, you read that right. Developers should be empowered with great tools that make security easy, and this conviction is the impetus behind Contrast for Eclipse.”
Contrast Security says its team is conducting a number of trainings on Contrast for Eclipse to help developers be more informed on application vulnerabilities.

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- CISA Warns of Old JBoss RichFaces Vulnerability Being Exploited in Attacks
- NIST Publishes Final Version of 800-82r3 OT Security Guide
- Johnson Controls Hit by Ransomware
- Verisoul Raises $3.25 Million in Seed Funding to Detect Fake Users
- Government Shutdown Could Bench 80% of CISA Staff
- Google Rushes to Patch New Zero-Day Exploited by Spyware Vendor
- macOS 14 Sonoma Patches 60 Vulnerabilities
- New GPU Side-Channel Attack Allows Malicious Websites to Steal Data
Latest News
- Bankrupt IronNet Shuts Down Operations
- AWS Using MadPot Decoy System to Disrupt APTs, Botnets
- Generative AI Startup Nexusflow Raises $10.6 Million
- In Other News: RSA Encryption Attack, Meta AI Privacy, ShinyHunters Hacker Guilty Plea
- Researchers Extract Sounds From Still Images on Smartphone Cameras
- National Security Agency is Starting an Artificial Intelligence Security Center
- CISA Warns of Old JBoss RichFaces Vulnerability Being Exploited in Attacks
- Hackers Set Sights on Apache NiFi Flaw That Exposes Many Organizations to Attacks
