Welcome to the JFrog Blog

Announcing JFrog SAST: Build Trust and Release Code With Confidence

Announcing JFrog SAST: Build Trust and Release Code With Confidence

Today’s software applications power almost every aspect of our lives, and ensuring the security of these applications is paramount. Threat actors can cause devastating consequences for companies, leading to financial losses, reputational damage, and legal repercussions. Companies building commercial or in-house applications must adopt robust security measures throughout their software development lifecycle to avoid releasing…
Take control of your Security: How to use Build-Info in your VCS to track vulnerable versions

Take control of your Security: How to use Build-Info in your VCS to track vulnerable versions

Tracking vulnerabilities and compliance requirements is essential for maintaining application security in any software project. However, this process can be time-consuming and complicated, especially as new issues are identified. Fortunately, the JFrog build-info provides a comprehensive solution by recording key information about your project's build. With build-info, you can easily track vulnerable versions of your…
Shifting Left of Left: Secure Enterprise Data with JFrog Curation

Shifting Left of Left: Secure Enterprise Data with JFrog Curation

In 2022, nearly 1,700 entities across the globe fell victim to software supply chain attacks, impacting over 10 million people. Nearly each of these attacks included some element of faulty or nefarious open-source code. Software developers commonly rely on open-source components to speed up the development process, but as we can see, this practice has…
Spring WebFlux – CVE-2023-34034 – Write-Up and Proof-of-Concept

Spring WebFlux – CVE-2023-34034 – Write-Up and Proof-of-Concept

Spring Security's newly released versions contain a fix for a broken access control vulnerability - CVE-2023-34034 - which was given a critical NVD severity (CVSS 9.8) and a high severity by Spring’s maintainers. Given the severe potential impact of the vulnerability on Spring WebFlux applications (that use Spring Security for authentication and access control), its…
The Latest JFrog Plugin for Jenkins

The Latest JFrog Plugin for Jenkins

We all know that artifact management is an important part of our development lifecycle, and if you’re using Jenkins you’ll also need to store your builds and binaries. In the world of DevOps, efficient integration and management of artifacts and dependencies are crucial for successful software delivery. Together,  Jenkins and JFrog Artifactory offer a powerful…
Don’t waste time on irrelevant false positive alerts in your source code

Don’t waste time on irrelevant false positive alerts in your source code

Are you tired of using security tools that generate endless results, making it impossible to identify actual risks? Do you struggle with inefficient prioritization due to a lack of context, making the process of assessing and remediating vulnerabilities a time-consuming nightmare? Look no further than JFrog’s Contextual Analysis, available as part of the "jf audit"…
Prevent Credential Exposure in Code

Prevent Credential Exposure in Code

In today's software development world, developers rely on numerous types of secrets (credentials), to facilitate seamless interaction between application components. As modern applications become more complex and require authentication for services and dependencies, the practice of hardcoding secrets during software development is on the rise. The most common types of credentials are: Application Program Interface…
JFrog and Atlassian simplify DevOps-Centric security

JFrog and Atlassian simplify DevOps-Centric security

Atlassian has long been helping agile teams collaborate, track progress, and manage projects more efficiently, and is now simplifying software security for Jira Software Cloud users. We’re excited to announce that JFrog has joined Atlassian as a security partner. The integration with the JFrog Platform enables JFrog Xray data to be surfaced in Jira, making…
Got tool sprawl? Let’s consolidate.

Got tool sprawl? Let’s consolidate.

If you’re a developer, DevOps engineer, or security technician, you know the feeling of managing multiple tools at once. It’s a phenomenon so prevalent in software development that it has its own name, “tool sprawl,” and it can make it hard for teams to do their jobs efficiently. What causes tool sprawl? Problems caused by…
How a software supply chain platform streamlines DevOps best practices

How a software supply chain platform streamlines DevOps best practices

Today's software developers are tasked with a lot more than just coding. To keep up with the fast-paced software-driven economy, they need to focus on automation, collaboration, security, distribution, data analysis, and agility to ensure quality builds and get releases to customers quickly and securely. DevOps and security professionals need a centralized system of records…