Supported Languages
Contrast Security integrates with your tools at every stage of the development lifecycle, making connectivity seamless and fast.
![system system](https://www.contrastsecurity.com/hubfs/system.png)
Contrast Security Supported Platforms
Resources to help you get secure code moving
- Show All
- Java
- JavaScript
- .NET
- .NET Core
- NODE.JS
- Ruby
- Python
- GoLang
- Scala
- PHP
- Kotlin
![blog: Drupal security challenges faced by developers](https://www.contrastsecurity.com/hubfs/Drupal-1.jpg)
blog: Drupal security challenges faced by developers
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
![blog: Contrast Scan adds support for client-side JavaScript including Angular, React, & jQuery](https://www.contrastsecurity.com/hubfs/cs-blog-programing-language-2501x1306-101122.jpg)
blog: Contrast Scan adds support for client-side JavaScript including Angular, React, & jQuery
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
![.NET Core Framewor](https://www.contrastsecurity.com/hubfs/Screen%20Shot%202022-10-27%20at%2010.10.35%20AM.png)
.NET Core Framewor
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
![blog: Configure a Python agent with Contrast in five minutes](https://www.contrastsecurity.com/hubfs/python.jpg)
blog: Configure a Python agent with Contrast in five minutes
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
![blog: Debunking IAST myths](https://www.contrastsecurity.com/hubfs/IAST%20image.jpg)
blog: Debunking IAST myths
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
![blog: Debunking IAST myths](https://www.contrastsecurity.com/hubfs/IAST%20image.jpg)
blog: Debunking IAST myths
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
![blog: Debunking IAST myths](https://www.contrastsecurity.com/hubfs/IAST%20image.jpg)
blog: Debunking IAST myths
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
![blog: How to detect Log4j vulnerabilities in Java projects for free with CodeSec](https://www.contrastsecurity.com/hubfs/codesec-log4j-blog.jpg)
blog: How to detect Log4j vulnerabilities in Java projects for free with CodeSec
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
![blog: Why do modern companies choose Kotlin for server-side development?](https://www.contrastsecurity.com/hubfs/cs_kotlin-blog_1200x627.png)
blog: Why do modern companies choose Kotlin for server-side development?
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
![blog: Open-Source Python Salt CVEs and the Cisco Server Breach](https://www.contrastsecurity.com/hubfs/codepatrol-bg-1.jpg)
blog: Open-Source Python Salt CVEs and the Cisco Server Breach
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
![blog: Secure your PHP Applications with Contrast Security](https://www.contrastsecurity.com/hubfs/Untitled%20design-3.png)
blog: Secure your PHP Applications with Contrast Security
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
![blog: Securing Server-Side Kotlin](https://www.contrastsecurity.com/hubfs/cs_kotlin-blog_1200x627.png)
blog: Securing Server-Side Kotlin
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
![blog: Scaling to Scala](https://www.contrastsecurity.com/hubfs/Blog_Scaling%20to%20Scala_12132021.png)
blog: Scaling to Scala
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
![blog: Automating .Net 6 Application Protection](https://www.contrastsecurity.com/hubfs/Blog_11092021_Automating%20.Net%206%20Application%20Protection-1.png)
blog: Automating .Net 6 Application Protection
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
![Blog: Understanding Software Supply Chain Risks and How to Mitigate Them](https://www.contrastsecurity.com/hubfs/Blog_10112021_Understanding%20Software%20Supply%20Chain%20Risks%20and%20How%20to%20Mitigate%20Them.png)
Blog: Understanding Software Supply Chain Risks and How to Mitigate Them
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
![blog: Why Developers Should Care About Our New Go Agent: A Look Under the Hood](https://www.contrastsecurity.com/hubfs/Blog_06172021_Why%20Developers%20Should%20Care%20About%20Our%20New%20Go%20Agent-%20A%20Look%20Under%20the%20Hood.png)
blog: Why Developers Should Care About Our New Go Agent: A Look Under the Hood
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
![blog: Why Developers Should Care About Our New Go Agent: A Look Under the Hood](https://www.contrastsecurity.com/hubfs/Blog_06172021_Why%20Developers%20Should%20Care%20About%20Our%20New%20Go%20Agent-%20A%20Look%20Under%20the%20Hood.png)
blog: Why Developers Should Care About Our New Go Agent: A Look Under the Hood
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
![blog: Contrast Security Further Expands Industry’s Broadest IAST Language Support with the Addition of Python](https://www.contrastsecurity.com/hubfs/Screen%20Shot%202022-10-26%20at%204.08.39%20PM.png)
blog: Contrast Security Further Expands Industry’s Broadest IAST Language Support with the Addition of Python
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
![blog: Using Contrast to Prevent Bootstrap-sass RubyGem Remote Code Execution (RCE)](https://www.contrastsecurity.com/hubfs/Screen%20Shot%202022-10-27%20at%209.56.14%20AM.png)
blog: Using Contrast to Prevent Bootstrap-sass RubyGem Remote Code Execution (RCE)
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
![blog: The Agony and the Ecstasy of Securing .NET Applications](https://www.contrastsecurity.com/hubfs/Archived/Imported_Blog_Media/microsoft-net-framework-error-2.png)
blog: The Agony and the Ecstasy of Securing .NET Applications
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
![What is Node.js?](https://www.contrastsecurity.com/hubfs/Screen%20Shot%202022-10-26%20at%204.08.39%20PM.png)
What is Node.js?
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
![Ruby Programming Language](https://www.contrastsecurity.com/hubfs/Screen%20Shot%202022-10-26%20at%204.08.39%20PM.png)
Ruby Programming Language
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
![Go Language](https://www.contrastsecurity.com/hubfs/codepatrol-bg2.jpg)
Go Language
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
![What is a MAN-IN-THE-MIDDLE (MITM) ATTACK?](https://www.contrastsecurity.com/hubfs/Screen%20Shot%202022-10-27%20at%2010.10.35%20AM.png)
What is a MAN-IN-THE-MIDDLE (MITM) ATTACK?
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
![HOW TO INSTRUMENT AN APPLICATION USING RUBY agent](https://www.contrastsecurity.com/hubfs/codepatrol-bg-1.jpg)
HOW TO INSTRUMENT AN APPLICATION USING RUBY agent
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
![Python Programming Language](https://www.contrastsecurity.com/hubfs/Screen%20Shot%202022-10-27%20at%2010.10.35%20AM.png)
Python Programming Language
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
![Contrast Security Adds Go Language Support For Industry's First Interactive Application Security Analyzer](https://www.contrastsecurity.com/hubfs/Screen%20Shot%202022-10-27%20at%2010.10.35%20AM.png)
Contrast Security Adds Go Language Support For Industry's First Interactive Application Security Analyzer
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
![Contrast Security Announces New Approach to Securing PHP Applications](https://www.contrastsecurity.com/hubfs/Screen%20Shot%202022-10-27%20at%2010.10.35%20AM.png)
Contrast Security Announces New Approach to Securing PHP Applications
![“HOW TO” INSTRUMENT A NODE agent](https://www.contrastsecurity.com/hubfs/Screen%20Shot%202022-10-26%20at%204.22.11%20PM.png)
“HOW TO” INSTRUMENT A NODE agent
![arrow-right-tertiary](https://www.contrastsecurity.com/hubfs/Contrast_Security/icons/arrow-right-tertiary.png)
Secure code & serverless environments for free! Through simple command line interface.
Secure code & serverless environments for free! Through simple command line interface.
Event and Live Demo Announcement
![api-world](https://www.contrastsecurity.com/hs-fs/hubfs/api-world.webp?width=1322&name=api-world.webp)
API WORLD
October 25 - November 3rd - LIVE in-person and Virtual
Hear from our very own Steve Wilson, Chief Product Officer, at API World where thousands of global technical leaders, engineers, software architects, and executives at the world’s largest and longest-running API & microservices event – in its 11th year!
![owasp-logo-blog-img](https://www.contrastsecurity.com/hs-fs/hubfs/owasp-logo-blog-img.jpg?width=759&name=owasp-logo-blog-img.jpg)
OWASP GLOBAL APPSEC
November 14–18, 2022 | San Francisco, CA
Designed for private and public sector infosec professionals, the two day OWASP conferences equip developers, defenders, and advocates to build a more secure web.
![livewebinar](https://www.contrastsecurity.com/hs-fs/hubfs/livewebinar.jpg?width=759&name=livewebinar.jpg)
live Webinar: THREATS FACING THE FINANCIAL SECTOR: FROM HEIST TO HOSTAGE SITUATION
November 3rd, 2022 | 10am PT / 1pm ET
Financial institutions face evolving cybercrime conspiracies coordinated by international cyber cartels.