Skip to content

Supported Languages

Contrast Security integrates with your tools at every stage of the development lifecycle, making connectivity seamless and fast.

system

Contrast Security Supported Platforms

java-l-logo

Getting Started with
Java

js-l-logo

Getting Started with
JavaScript

net-l-logo

Getting Started with
.NET

dotnet-l-logo

Getting Started with
.NET Core

node-l-logo-1

Getting Started with
NODE.JS

ruby-l-logo

Getting Started with
Ruby

python-l-logo

Getting Started with
Python

golang-l-logo

Getting Started with
GoLang

scala-l-logo

Getting Started with
Scala

php-l-logo

Getting Started with
PHP

kotlin-l-logo

Getting Started with
Kotlin

Vue SL

Getting Started with
Vue.js

TypeScript SL

Getting Started with
TypeScript

Resources to help you get secure code moving

Show All
  • Show All
  • Java
  • JavaScript
  • .NET
  • .NET Core
  • NODE.JS
  • Ruby
  • Python
  • GoLang
  • Scala
  • PHP
  • Kotlin
blog: Drupal security challenges faced by developers

blog: Drupal security challenges faced by developers

Learn More arrow-right-tertiary
blog: Contrast Scan adds support for client-side JavaScript including Angular, React, & jQuery

blog: Contrast Scan adds support for client-side JavaScript including Angular, React, & jQuery

Read Blog arrow-right-tertiary
.NET Core Framewor

.NET Core Framewor

Learn More arrow-right-tertiary
blog: Configure a Python agent with Contrast in five minutes

blog: Configure a Python agent with Contrast in five minutes

Learn More arrow-right-tertiary
blog: Debunking IAST myths

blog: Debunking IAST myths

Learn More arrow-right-tertiary
blog: Debunking IAST myths

blog: Debunking IAST myths

Learn More arrow-right-tertiary
blog: Debunking IAST myths

blog: Debunking IAST myths

Learn More arrow-right-tertiary
blog: How to detect Log4j vulnerabilities in Java projects for free with CodeSec

blog: How to detect Log4j vulnerabilities in Java projects for free with CodeSec

Read Blog arrow-right-tertiary
blog: Why do modern companies choose Kotlin for server-side development?

blog: Why do modern companies choose Kotlin for server-side development?

Learn More arrow-right-tertiary
blog: Open-Source Python Salt CVEs and the Cisco Server Breach

blog: Open-Source Python Salt CVEs and the Cisco Server Breach

Learn More arrow-right-tertiary
blog: Secure your PHP Applications with Contrast Security

blog: Secure your PHP Applications with Contrast Security

Learn More arrow-right-tertiary
blog: Securing Server-Side Kotlin

blog: Securing Server-Side Kotlin

Learn More arrow-right-tertiary
blog: Scaling to Scala

blog: Scaling to Scala

Learn More arrow-right-tertiary
blog: Automating .Net 6 Application Protection

blog: Automating .Net 6 Application Protection

Read Blog arrow-right-tertiary
Blog: Understanding Software Supply Chain Risks and How to Mitigate Them

Blog: Understanding Software Supply Chain Risks and How to Mitigate Them

Read Blog arrow-right-tertiary
blog: Why Developers Should Care About Our New Go Agent: A Look Under the Hood

blog: Why Developers Should Care About Our New Go Agent: A Look Under the Hood

Read Blog arrow-right-tertiary
blog: Why Developers Should Care About Our New Go Agent: A Look Under the Hood

blog: Why Developers Should Care About Our New Go Agent: A Look Under the Hood

Read Blog arrow-right-tertiary
blog: Contrast Security Further Expands Industry’s Broadest IAST Language Support with the Addition of Python

blog: Contrast Security Further Expands Industry’s Broadest IAST Language Support with the Addition of Python

Learn More arrow-right-tertiary
blog: Using Contrast to Prevent Bootstrap-sass RubyGem Remote Code Execution (RCE)

blog: Using Contrast to Prevent Bootstrap-sass RubyGem Remote Code Execution (RCE)

Learn More arrow-right-tertiary
blog: The Agony and the Ecstasy of Securing .NET Applications

blog: The Agony and the Ecstasy of Securing .NET Applications

Read Blog arrow-right-tertiary
What is Node.js?

What is Node.js?

Learn More arrow-right-tertiary
Ruby Programming Language

Ruby Programming Language

Learn More arrow-right-tertiary
Go Language

Go Language

Learn More arrow-right-tertiary
What is a MAN-IN-THE-MIDDLE (MITM) ATTACK?

What is a MAN-IN-THE-MIDDLE (MITM) ATTACK?

Learn More arrow-right-tertiary
HOW TO INSTRUMENT AN APPLICATION USING RUBY agent

HOW TO INSTRUMENT AN APPLICATION USING RUBY agent

Learn More arrow-right-tertiary
Python Programming Language

Python Programming Language

Learn More arrow-right-tertiary
Contrast Security Adds Go Language Support For Industry's First Interactive Application Security Analyzer

Contrast Security Adds Go Language Support For Industry's First Interactive Application Security Analyzer

Learn More arrow-right-tertiary
Contrast Security Announces New Approach to Securing PHP Applications

Contrast Security Announces New Approach to Securing PHP Applications

“HOW TO” INSTRUMENT A NODE agent

“HOW TO” INSTRUMENT A NODE agent

Watch Now arrow-right-tertiary

codesec-icon

Secure code & serverless environments for free! Through simple command line interface.

demo-icon

Secure code & serverless environments for free! Through simple command line interface.

Event and Live Demo Announcement

api-world

API WORLD

October 25 - November 3rd - LIVE in-person and Virtual

Hear from our very own Steve Wilson, Chief Product Officer, at API World where thousands of global technical leaders, engineers, software architects, and executives at the world’s largest and longest-running API & microservices event – in its 11th year!

owasp-logo-blog-img

OWASP GLOBAL APPSEC

November 14–18, 2022 | San Francisco, CA

Designed for private and public sector infosec professionals, the two day OWASP conferences equip developers, defenders, and advocates to build a more secure web.

livewebinar

live Webinar: THREATS FACING THE FINANCIAL SECTOR: FROM HEIST TO HOSTAGE SITUATION

November 3rd, 2022 | 10am PT / 1pm ET

Financial institutions face evolving cybercrime conspiracies coordinated by international cyber cartels.