This page is not yet available in Spanish. We are working on its translation. If you have any questions or feedback about our current translation project, feel free to reach out to us!
Software Composition Analysis is supported on all frameworks
If Code Security does not support your framework, it will still detect Weak Cipher, Weak Hashing, Insecure Cookie, Cookie without HttpOnly Flag, and Cookie without SameSite Flag vulnerabilities.
Framework
Versions
Threat Detection supported?
Threat Protection supported?
Code Security?
Grizzly
2.0+
Glassfish
gRPC
1.5+
Blocking not yet available for gRPC
Java Servlet
2.3+, 3.0+
Jetty
7.0-9.x, 10.x
Spring Boot
1.5
Spring Web (MVC)
4.0+
Spring WebFlux
5.0+
Tomcat
5.5+
Vert.x
3.4-3.9.x
Note: Many application servers are Servlet compatible and are automatically covered by that instrumentation, such as Websphere, Weblogic, and JBoss. Also, frameworks like Spring Boot (version 3) inherently work because they usually use a supported embedded application server, such as Tomcat, Jetty, or Netty.
Software Composition Analysis is supported on all frameworks
If Code Security does not support your framework, it will still detect Weak Cipher, Weak Hashing, Insecure Cookie, Cookie without HttpOnly Flag, and Cookie without SameSite Flag vulnerabilities.
Software Composition Analysis is supported on all frameworks
Threat Protection also works at the HTTP request (input) layer, and so works for all databases by default, even those not listed in the table below.
If your framework is not supported below, Code Security won’t detect SQL Injection vulnerabilities, but will still detect the rest of vulnerability types listed here.
Database
Versions
Threat Detection supported?
Code Security?
Aerospike
4.0+
Couchbase
2.0+
JDBC
N/A
MongoDB
3.0-4.0+
dd-java-agent is also compatible with common JDBC drivers for Threat Detection, such as: