Skip to main content

SCA Scanner - Supported Languages and Package Managers

All languages and package managers that are supported for the SCA standalone platform are also supported when running the SCA scanner in Checkmarx One.

Supported Languages and Package Managers

Checkmarx SCA uses the following methods to identify the 3rd party packages in your project:

  1. File Analysis – Checkmarx SCA identifies all files in your project that may be part of a 3rd party package, and analyzes them in order to determine which packages are being used. This is done by comparing the hashes and metadata of the relevant files (e.g., .jar files for Java, .js files for JS) in the scanned project with the hashes and metadata of packages that are catalogued in our database. As part of this process, compressed files of supported types (.jar, .war, .ear, .zip) are extracted so that the files can be analyzed. This is applied recursively up to four levels of depth.

    File Analysis is done for the supported languages/frameworks listed below, using the corresponding file types specified in the table.

  2. Dependency Resolution - Checkmarx SCA uses package managers to resolve the dependencies against customer-defined or public repositories and extract the dependency trees.

    Dependency Resolution is done using the supported package managers listed below and the corresponding manifest files specified in the table.

Supported Languages and Package Managers

Notice

If you are using Checkmarx SCA Resolver, then you need to install the relevant package managers locally. For installation info, see Installing Supported Package Managers for Resolver.

download.png

JVM Languages: Java, Kotlin, Android, Groovy, Scala

Additional Frameworks: Struts, Spring

Repository: Maven Central, Sonatype, Apache

File Types: .jar

Supported Languages for Exploitable Path: Java

Package Managers

Vulnerability Support

Malicious Package Support

Manifest Files

Maven

Check_New.png

Check_New.png

pom.xml

Gradle

Check_New.png

MicrosoftTeams-image__1_.png

build.gradle , build.gradle.kts

Ivy

Check_New.png

MicrosoftTeams-image__1_.png

ivy.xml,

build.xml

SBT

Check_New.png

MicrosoftTeams-image__1_.png

build.sbt

6413713542.png

Languages/Frameworks: JavaScript, TypeScript, NodeJS, React, Angular, Apex

Tip

Apex is only supported when running the scan using Checkmarx SCA Resolver with the --extract-archives resource argument, see Checkmarx SCA Resolver Configuration Arguments.

Repository: NPM

File Types: .js

Supported Languages for Exploitable Path: JavaScript

Package Manager

Vulnerability Support

Malicious Package Support

Manifest Files (Packages marked with (blue star) are required)

NPM

Check_New.png

Check_New.png

package.json(blue star) , package-lock.json1]

Yarn (and Yarn 2)

Check_New.png

Check_New.png

package.json(blue star) , yarn.lock(blue star)1]

Bower

Check_New.png

Check_New.png

bower.json

1] When a lock file is present in the project, SCA relies on the package manager to obtain the dependencies. Therefore, it is important to ensure that your lock file is kept up-to-date with any changes that have been made in the manifest file.

6414401614.png

Languages/Frameworks: C#, F#, .NET, .NET Core, WCF, WPF, ASP.NET, C++

Repository: NuGet

File Types: .dll

Supported Languages for Exploitable Path: C#

Package Manager

Vulnerability Support

Malicious Package Support

Manifest Files

NuGet

Check_New.png

Check_New.png

*.csproj , packages.config

6414073972.png

Languages/Frameworks: Python, Django, Flask

Repository: PyPi

File Types: .egg, .whl

Supported Languages for Exploitable Path: Python

Package Manager

Vulnerability Support

Malicious Package Support

Manifest Files (Packages marked with (blue star) are required)

PIP

Check_New.png

Check_New.png

requirements.txt, requirements-*.txt, requirement.txt, requirement-*.txt

Poetry

Check_New.png

Check_New.png

pyproject.toml(blue star), poetry.lock

Setuptools

Check_New.png

Check_New.png

Setup.cfgSetup.py

6412632402.png

Languages/Frameworks: PHP, Dupal

Repository: Packagist

File Types: none

Exploitable Path: Not supported

Package Manager

Vulnerability Support

Malicious Package Support

Manifest Files (Packages marked with (blue star) are required)

Composer

Check_New.png

Check_New.png

composer.json(blue star) , composer.lock

6413779054.png

Languages/Frameworks: Swift, Objective c

Repository: GitHub

File Types: none

Exploitable Path: Not supported

Package Manager

Vulnerability Support

Malicious Package Support

Manifest Files (Packages marked with (blue star) are required)

SwiftPm

Check_New.png

Check_New.png

Package.swift, Package.resolved

CocoaPods

Check_New.png

MicrosoftTeams-image__1_.png

Podfile(blue star), Podfile.lock

Carthage

Check_New.png

MicrosoftTeams-image__1_.png

Cartfile(blue star), Cartfile.private, Cartfile.resolved

Tip

At least one .private or .resolved file must be included.

6413877449.png

Languages/Frameworks: Go

Repository: Golang

File Types: none

Exploitable Path: Not supported

Supported Package Manager

Vulnerability Support

Malicious Package Support

Manifest Files (Packages marked with (blue star) are required)

GoModules

Check_New.png

Check_New.png

go.mod(blue star), go.sum

ruby.png

Languages/Frameworks: Ruby

Repository: RubyGems

File Types: none

Exploitable Path: Not supported

Supported Package Manager

Vulnerability Support

Malicious Package Support

Manifest Files (Packages marked with (blue star) are required)

RubyGems

Check_New.png

Check_New.png

Gemfile(blue star), Gemfile.lock

Bundler

Check_New.png

MicrosoftTeams-image__1_.png

download__1_.png

Languages/Frameworks: C, C++

Repository: GitHub, Conan, Central

File Types: .cpp, .c, .h, .hpp, .a, .o, .so

Exploitable Path: Not supported

Tip

C++ is supported only for File Analysis (fingerprints), not for package resolution.

Supported Package Manager

Vulnerability Support

Malicious Package Support

Manifest Files

none

Check_New.png

MicrosoftTeams-image__1_.png

none

Unity_logo_PNG10.png

Languages/Frameworks: Unity

Repository:Unity Technologies, Needle-mirror, Open UPM

File Types: none

Exploitable Path: Not supported

Supported Package Manager

Vulnerability Support

Malicious Package Support

Manifest Files (Packages marked with (blue star) are required)

none

Check_New.png

MicrosoftTeams-image__1_.png

manifest.json(blue star), packages.json(blue star)

Perl_Programming_Language.png

Languages/Frameworks: Perl

Repository: Cpan

File Types: .pl, .pm

Exploitable Path: Not supported

Supported Package Manager

Vulnerability Support

Malicious Package Support

Manifest Files

Cpan

Check_New.png

MicrosoftTeams-image__1_.png

cpanfile, spcanfile.snapshot

Picture1.jpg

Languages/Frameworks: Dart, Flutter

Repository: N/A

File Types: none

Exploitable Path: Not supported

Supported Package Manager

Vulnerability Support

Malicious Package Support

Manifest Files

Pub

MicrosoftTeams-image__1_.png 1]

Check_New.png

pubspec.lock

1] Support of Pub is only for identifying malicious packages. Non-malicious packages are not shown at all in the Packages or Risks tabs.

Container Scans

Checkmarx SCA is capable of scanning Dockerfiles and container images as long as they are hosted in supported registries and they are used in supported ecosystems.

For more info about container scans, see Container Scans.

Supported Registries

Container scans run via SCA Resolver support scanning of images from any registry for which you can run the docker pull command, e.g., DockerHub, Amazon Elastic Container Registry (ECR), Google Container Registry (GCR), Quay, JFrog Container Registry (JCR) etc.

Supported Ecosystems

  • Debian (dpkg)

  • Alpine (apk)

  • C (conan)

  • C++ (conan)

  • Dotnet (deps.json)

  • Go (go.mod, Go binaries)

  • Java (jar, ear, war, par, sar, native-image)

  • JavaScript (npm, yarn)

  • PHP (composer)

  • Python (wheel, egg, poetry, requirements.txt)

  • Red Hat (rpm)

  • Ruby (gem)dpkg