Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Contrast Security Releases Free Vulnerability Detection Plugin for Eclipse

Contrast Security announced on Monday the availability of a free plugin that allows software developers to easily find vulnerabilities in their applications.

Contrast Security announced on Monday the availability of a free plugin that allows software developers to easily find vulnerabilities in their applications.

Contrast for Eclipse seamlessly integrates with the Eclipse Java Integrated Development Environment (IDE). The tool, powered by Contrast’s patented instrumentation technology, provides accurate and automatic detection of OWASP top 10 vulnerabilities, and it instantly informs developers on the exact location of the flaw in the source code.

Contrast for Eclipse application security plugin

The list of features also includes detailed run-time code and data flow analysis, andcontext-sensitive remediation tips. Contrast for Eclipse is designed to analyze both custom code and libraries, the company said.

According to the application security software provider, over 22 vulnerabilities make it into an application’s final release due to the lack of application security. Most organizations secure only a small percentage of their solutions because legacy static application security testing (SAST) and dynamic application security testing (DAST) tools are ineffective, and because manual code review is costly.

By using the new plugin, developers no longer have to worry about manually reviewing their code or tracking false positives, the firm said.

The company warns that attacks against applications can lead to security breaches that traditional network perimeter protection solutions are unable to detect.

“We believe in a future free of software vulnerabilities – that is our mission,” said Jeff Williams, founder and CTO of Contrast Security. “In bringing Contrast for Eclipse to market, we’re giving developers the control they need to quickly and easily eliminate application vulnerabilities at the source. There is no reason to ever have another SQL injection attack – yes, you read that right. Developers should be empowered with great tools that make security easy, and this conviction is the impetus behind Contrast for Eclipse.”

Contrast Security says its team is conducting a number of trainings on Contrast for Eclipse to help developers be more informed on application vulnerabilities.

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Application Security

A new report finds that barely 1% of all SBOMs being generated today meets the “minimum elements” defined by the U.S. government.

Application Security

A security vulnerability identified on AliExpress, the wholesale marketplace owned by the Chinese e-commerce giant Alibaba, could have been exploited by hackers to hijack...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...