Skip to main content

Current Single-Tenant Version | 3.54

New Features and Enhancements

AI Query Builder

The new AI Query Builder helps customers create and refine CxQL queries more quickly and intuitively by leveraging ChatGPT in the Queries Editor.

Use guided example prompts, on-demand regeneration, and easy code copying to customize queries with less effort and fewer errors - improving productivity and reducing time spent on manual query tuning.

Access to this feature is limited to users with Edit Query permissions.

For details, see our documentation.

Custom States for SCA and IaC Security Scanners

We now support custom states for risks identified by the SCA and IaC Security scanners.

For more information about custom states, see our Documentation Portal.

Note

This capability is available for new IAM customers only.

Application Type Classification for Improved Risk Focus

Applications can now be classified as Business or Internal, enabling more accurate risk prioritization.

Internal applications are excluded from meaningful risk impact, reducing noise, while Business applications continue to factor criticality into risk scoring.

This ensures that risk insights and top-risk views focus on applications that truly impact the business.

New Scan Status: Partial

A new Partial scan status has been added to scan history to better reflect scans that produced results but failed later in the process.

Their results remain available for review by downloading the scan log, providing clearer visibility and reducing confusion during scan analysis.

Accessibility Improvements: ADA Severity 1 Compliance

We’ve addressed Severity 1 accessibility issues identified during enterprise validation to improve compliance with ADA and WCAG 2.2 standards.

These fixes focus on critical areas such as keyboard navigation, focus order, and error identification, ensuring the platform is more accessible and usable for all users.

Ignore Images in Cloud Insights

You can now mark container images in the Cloud Insights inventory as Ignored to reduce noise from images that don’t require remediation.

From the inventory table, select one or more images and choose Ignore to hide them from the main view. Ignored images remain accessible through the Show Ignored Images filter, where you can review them and restore them to the inventory at any time.

This helps keep your inventory focused and actionable while preserving full control and visibility.

For more information, see documentation.

Protected Branch Wildcards for PR Scanning

You can now define protected branches using wildcard patterns for pull request scanning.

Instead of listing individual branch names, you can use flexible patterns (e.g., *, release*, *release) to automatically include matching branches.

This reduces manual configuration, improves coverage, and scales easily for repositories with dynamic or convention-based branching strategies.

Include Container Security Results in Reports

Reports now support Container Security scan results.

When generating a project or application report, you can now select the Container Security scanner alongside the existing scanner options. This delivers a unified reporting experience, presenting all scan types in a consistent format and ensuring a single, consolidated view of security insights.

Include Container Security Data in Analytics Dashboards

Analytics dashboards now show metrics from the Container Security scanner.

You can now view container-related findings and KPIs alongside existing analytics data from other scanners. This creates a unified analytics experience, giving you consistent visibility across all supported scan types.

Developer Assist Usage Dashboard

A new Developer Assist Usage dashboard is now available in Analytics (for customers with an AI license). The dashboard introduces multiple KPIs that surface how developers interact with AI-generated remediations, including AI Suggestions, Fix Clicked, and Unique Users. It also includes a donut widget that breaks down Developer Assist usage by scanner, and a bar graph showing real-time vulnerability detection by scanner.

This consolidated view improves transparency and highlights adoption trends without requiring custom reporting.

For more information, see our Documentation Portal.

BYOR Management: Web-Based External Imports

BYOR (Bring Your Own Results) now includes a web-based import experience, making it easier and faster for customers to bring external scan results into Checkmarx One. Users can import SARIF files from the UI, associate them with projects, and track progress and status in real time.

This enhancement improves visibility and enables security teams to review issue counts and severity breakdowns immediately after import.

BYOR Import Management: Import Deletion

Customers can now delete BYOR imports and their associated results. Deletion is available for completed, failed, or canceled imports and can be performed via the UI or API, including bulk deletion where permitted.

BYOR: Vulnerability Author (Blame) Identification

BYOR imports now identify and display the author (blamer) and commit ID for vulnerabilities when this information is provided by external tools. When blame data is unavailable or invalid, the author is shown as N/A.

By parsing blame metadata directly from imported files, customers can see who introduced a vulnerability and in which commit, without relying on additional Git queries.

GitHub App Authentication Support for Code Repository Integrations

Checkmarx One now supports GitHub App–based authentication for code repository integrations as a more secure and modern alternative to Personal Access Tokens and OAuth apps. This update enables short-lived, scoped tokens, automatic token rotation, and granular permission control, significantly reducing the risk of credential leakage and simplifying integration management.

This enhancement also unlocks compatibility with GitHub Enterprise Managed Users (EMU), allowing enterprise customers with strict identity and access controls to integrate GitHub repositories.

For more information, see our Documentation Portal.

IAM: Expanded OAuth Client Character Support

The allowed character set for OAuth client identifiers has been expanded to include the @ character.

Manage Custom States in the UI

You can now create and delete custom states directly from Global Settings in the web application. After a state is defined, it becomes available tenant-wide for vulnerability triage. This streamlines configuration and removes the need to manage custom states through the API.

Note

Supported only for accounts with New Access Management.

For more information about custom states, see our Documentation Portal.

Secret Detection | Scanning Git Commit History

A new Git commit history setting in Settings > Secret Detection lets users control whether Secret Detection scans Git commit history.

When set to true (default: false), Secret Detection scans both the working tree and Git commit history, providing full historical coverage for compliance and deeper analysis.

The setting is available in:

  • UI (Global and Project Settings)

  • API (commitHistory.enabled <true|false> parameter in Secret Detection (SCS) settings)

  • CLI (--scs-commit-history=<true|false> flag).

Secret Detection | Confluence Scanning (API)

Secret Detection now supports scanning Confluence content via API-triggered scans, with results shown in the Secrets Detection viewer alongside other scan sources.

You can scan individual pages, entire spaces, or all Confluence spaces to identify exposed secrets in collaboration content. Findings include severity, page location, detection context (current or history), and standard remediation guidance.

Custom Date Range Filter in Analytics

Analytics now supports a custom date range filter, allowing you to select exact start and end dates using a classic date picker. The selected range is applied consistently across all KPIs, trend charts, and over-time metrics on the Analytics page.

This gives you full control over the timeframe you analyze, making it easier to create accurate reports, investigate specific periods, and base decisions on the most relevant data instead of fixed, predefined ranges.

To view a full explanation of Analytics filters, see Filtering.

Webhook Creation Limits and Safeguards

Webhook creation now includes built-in limits to improve platform stability and prevent accidental overload of internal services. Users can create only one webhook per Payload URL per level (Project or Tenant), with clear guidance to update an existing webhook if a duplicate is detected. The total number of webhooks a user can create is capped based on the number of supported event types, ensuring predictable and controlled usage.

When the same Payload URL exists at both Project and Tenant levels, the Project-level webhook takes precedence for matching events, while different event selections will trigger all relevant requests.

These safeguards make webhook usage more reliable and predictable, prevent misconfiguration and sprawl, and ensure integrations scale safely without impacting system performance.

Webhook Status Visibility on Scan Details

Scan Details now show webhook execution status for each scan, making it clear whether associated webhooks were triggered successfully. When a scan completes, any related webhook activity is logged in the Scan Details side panel.

If a webhook fails, the log displays not only a Failed status but also a short error description explaining the reason. All existing scan conditions remain visible.

Monitor New Azure DevOps Repositories

Checkmarx One now supports automatic monitoring of new Azure DevOps (ADO) repositories. When enabled, any new project created in a connected ADO organization is automatically imported into Checkmarx One, with default settings applied and a scan triggered right away.

For more information on this feature, see Monitor New Repositories.

Include Secret Detection and Repository Health in Analytics Dashboards

Analytics dashboards now show metrics from the Secret Detection and Repository Health scanners.

You can now view findings and KPIs related to exposed secrets and repository health (OSSF) alongside existing analytics data from other scanners. This creates a unified analytics experience, giving you consistent visibility across all supported scan types.

Binary File Upload Limit Increased to 6GB

Enterprise customers can now upload binary files up to 6GB (previously 100MB) via the UI and supported APIs.

This update improves workflow efficiency for enterprise-scale use cases while maintaining secure and compliant file transfers.

SCA

New Automated Process to Add CVEs Quickly

In order to speed up the process of adding newly identified CVEs to our database, we have introduced a new automated process that identifies and publishes CVEs in a timely manner. However, this does not replace the need for our AppSec Research team to thoroughly analyze each CVE. Therefore, when the initial automated results are available, we publish the CVE with a note indicating that it is "pending manual review”. Once our AppSec team has completed their manual analysis they publish an updated version of the CVE details in which they correct any imprecise information and add important remarks about their analysis.

Highlighting AppSec Team Remarks

Our AppSec Research team often adds remarks based on their expert analysis. These remarks give important information about exploitability and remediation options. We now highlight these comments by showing them in a separate info box both in the scan results Risk Details page and in our AppSec Knowledge Center.

Additional Package Data in SCA Reports

We added new fields that provide additional information about the packages used in your project. This will help organizations meet regulatory requirements and improve the transparency and security of their software supply chain.

The Packages section of Checkmarx SCA reports now includes Component Description, Component Supplier and Executable Properties fields. And, SBOM reports (CycloneDX and SPDX) now include the Component Description field.

Added Suspected Malware Risks to AppSec Knowledge Center

You can now view Suspected Malware risk information in the AppSec Knowledge Center. It is presented similarly to vulnerabilities. This enables users to learn about specific risks without needing to scan a project with the risky package.

SCA Resolver Update

Download the latest version here.

Version 2.12.41 (January 29, 2026)

  • Allow password parameter to start with a dash "-"

Support for Vulnerability Exploitability eXchange (VEX)

You can now triage vulnerabilities in open-source dependencies using Vulnerability Exploitability eXchange (VEX) - a standardized, machine-readable format for communicating whether a known vulnerability (such as a CVE) actually affects your software.

This enhancement enables you to export SBOMs and reports that include clear, standardized exploitability classifications, helping teams reduce noise and focus on actionable risk.

Note

This capability complements existing triage workflows. All current triaging methods remain fully supported.

For more information about VEX triage, see Triaging SCA Results.

Filter Packages by Monitored State

You can now explicitly filter packages by the Monitored state (excluding Muted and Snoozed packages).

The new filter is available in both the SCA Results → Packages tab and the SCA Global Inventory → Packages tab.

This enhancement reduces noise, streamlines triage workflows, and ensures consistent filtering behavior across all package views.

Identify Copyright Details for Open-Source Packages

SCA now extracts copyright ownership information for open-source packages and includes it in reports, making it easier to track usage rights and meet compliance requirements. Copyright details are now included in exported SCA scan report and SBOMs. When multiple copyright statements are present, they are consolidated and clearly separated for readability.

This enhancement improves visibility, simplifies compliance workflows, and helps generate complete third-party notice files with minimal manual effort.

DAST

Proxy Support for DAST

Added proxy support for DAST, enabling you to scan internal, non‑public, or firewall‑protected applications from the cloud without whitelisting or exposing external IPs. This provides secure, temporary, on‑demand access for full dynamic testing while removing complex firewall configurations and accelerating security validation across cloud‑native and hybrid environments. For more information, see here.

CLI Commands for DAST Environment and Setup

You can now run your full DAST workflow directly from the CLI, removing the need for UI interaction or tunneling setups. A REST‑API‑driven script handles authentication, session creation, scanning, and results retrieval. For more information on the DAST CLI, see here.

New columns in Scans History tab

New Paths, Mode, and Initiator columns are now available in the Scans History tab.

  • The Paths column displays the number of paths found in the scan.

  • The Mode column indicates which scan mode was used. Older scans will show the default mode or remain blank if no current mode applies. Scans run with custom configurations that do not match any available mode will also appear with an empty Mode field.

  • The Initiator column shows whether the scan was initiated manually, triggered by a schedule, or launched from the DAST CLI.

DAST Vulnerabilities by Alert

Added support for viewing DAST vulnerabilities by Alert on the Environments page, in addition to the existing Instance view.

Viewing by Alert aligns with industry standards by displaying the underlying vulnerability, while viewing by Instance shows how many times that vulnerability was detected.

Associate Environment to Application

Added ways to associate the application with an environment. You can now associate applications to the environment through the Environment tab, Application tab, an environment’s settings, or through the application’s Overview tab.

DAST Overview Tab

The Overview tab displays an at‑a‑glance summary of an environment, including associated applications, groups, and users; scan dates and times; and high‑level dashboards of the discovered vulnerabilities and compliance postures.

Support for SOAP API

Added support for uploading SOAP API files in DAST. When configuring your API-type environment, in addition to Postman, OpenAPI, and HAR files, you can now upload SOAP API files.

For more information, refer to this page.

IaC

Updated to version 2.1.18

Enhancements

The following new queries have been added:

  • Terraform/GCP

    • Ensures that critical contacts are configured for the organization

    • Ensures that legacy networks do not exist for older projects

  • Terraform/Azure

    • Checks that the use of user access administrator is not restricted

Bug fixes

  • Fixed an issue causing scans for large projects to get stuck.

  • Fixed an issue where the Aging summary was incorrect when new scans had the same results as older scans.

For more IaC updates, see the IaC changelog.

IAM

Keycloak has been updated to version 26.4.

New Features and Enhancements

New Role: plugin-scanner for CI/CD and IDE Integrations

A new IAM role, plugin-scanner, is now available to support secure, least-privileged access for plugin-based integrations. This role provides minimal, scoped permissions required for:

  • Checkmarx CLI

  • CI/CD pipeline integrations

  • IDE plugins

This addition improves security by limiting access to only what is necessary for scanning operations, while simplifying configuration for teams using automation and development tooling.

New Role: analytics-developer-assist-view

A new role, analytics-developer-assist-view, has been introduced to provide users with view-only access to the Developer Assist dashboard. This role enables controlled visibility into developer-focused analytics while maintaining proper access governance.

New Role for Developer Standalone Plugin

A new least-privileged role has been added to support the Developer Standalone plugin without requiring tenant-level permissions. The role:

  • Can generate API Keys for authentication

  • Can view the License page and download the contributor developers CSV

  • Cannot create projects, applications, or trigger scans

This enables secure, fully decoupled plugin operation while preventing unnecessary access.

Resolved IAM Issues

Item

Description

AST-114556

Users cannot login with SAML or SSO on the DEU environment.

AST-118003

Adding groups during the project creation is not working properly when subgroups are involved.

AST-119795

Reset password event is shown in Audit Trail as user.mfa.updated.

AST-120182

Group name can contain special character "/" that is used as a subgroup divider.

AST-120187

It is allowed to create groups with identical names differing by letter case.

AST-120549

OAuth Client with permission manage-access is getting internal error 500 when calling the users API.

AST-121294

Two or more parallel mappers "Teams to Group Mapper" with "force" sync mode and "Override User Groups" remove all other mapper groups.

AST-121789

Multiple tenant owners appearing in the UI for the cxiam/users page.

AST-121792

It is possible to add a user without an email address.

CLI and Plugins Releases of December 2025

CLI Version 2.3.42

General improvements and bug fixes.

CLI Version 2.3.41

General improvements and bug fixes.

CI/CD Plugins

In December we released the following CI/CD plugin versions:

  • GitHub Actions - 2.3.30 (uses CLI v2.3.41)

Improvements and Bug Fixes

Status

Item

Platform

Description

NEW

General

GitHub Actions

General improvements and bug fixes.

IDE Plugins

In December we released the following IDE plugin versions:

  • JetBrains - 2.3.0 (uses CLI v2.3.42)

  • Visual Studio - 4.4.11 (uses CLI v2.3.41)

  • VS Code - 2.44.0 (uses CLI v2.3.42)

Improvements and Bug Fixes

Status

Item

Platform

Description

NEW

Developer Assist

JetBrains

Added the following realtime scanners to Checkmarx One Developer Assist:

  • IaC

  • ASCA

The plugin now supports all realtime scanners available in Dev Assist.

NEW

Developer Assist

JetBrains

Added the following realtime scanners to Checkmarx One Developer Assist:

  • Containers

  • Secret Detection

NEW

Developer Assist

JetBrains

Checkmarx One Developer Assist: Provides real-time IDE security scanning and agentic AI remediation, leveraging Checkmarx’s MCP to generate context-aware fixes.

For more details, see Checkmarx Developer Assist.

Note

Currently, AI remediation is only supported for the Open Source Software (OSS) realtime scanner.

NEW

ASCA

JetBrains

Added ASCA, a lightweight source code scanner that enables developers to identify secure coding best practice violations as they code.

NEW

SCA Results Triage

VS Code

You can now triage SCA results — edit the state and add comments directly from the Visual Studio Code console. (Changing severity is not supported for SCA in VS Code.)

UPDATED

Kiro IDE

VS Code

The plugin was adapted to make it compatible also with Kiro IDE. Starting with this version the extension can also be used in Kiro.

Resolved Issues

Item

Description

AST-123316

Updating work items via the Jira REST API returned an error.

AST-121186

Editing result notes in SSCS did not allow space characters.

AST-121067

Container scans failed after running for 24 hours.

AST-120768

Generic API Key vulnerabilities were falsely detected in assembly names.

AST-120581

The UI did not display a visible error when updating code repository permissions.

AST-116060

Container scans timed out and the scan status did not update.

AST-114195

The Project Conversion API could not initiate the process for Azure projects, with partial results logged and missing failure reasons.

AST-112402

Bitbucket repository existence was not properly validated during SCM project conversion via API.

AST-111473

Container scans failed due to timeout during execution.

AST-124393

During Access Management Phase 1 migration, the group ID was assigned to projects instead of the group name.

SCA-24268

Global Inventory experienced instability issues.

AST-124980

DAST report generation failed when the statistics field was null.

AST-121714

The API endpoint GET /api/projects-overview returned null for projects without groups.

AST-121074

SAST failed to retrieve queries from the Query Service.

AST-121016

Group filtering on the Projects list page did not work for certain users.

AST-117303

Scans failed due to a timeout in the repository store service.

AST-116243

The KICS results handler returned HTTP 403 when changing state despite correct permissions.

AST-115556

Results were not forwarded to Wiz due to a comparison failure.

AST-1148

Pull request comments were not created in Bitbucket and no notification appeared in the “More Details” section.

AST-11393

Negative counters appeared in the Project Overview aging summary, originating from the KICS engine.

AST-110751

Project data required database intervention to be corrected.

AST-124040

Report generation was unavailable for DAST scans with zero results.

AST-122133

A SQL sample caused incorrect LOC counts.

SCA-24962

SCA scans failed due to an internal error in the sca-worker.

SCA-24872

Vulnerabilities in log4j-1.2.14.jar were not detected through binary recognition.

SCA-24680

License information was incorrect or missing in SCA results.

SCA-24292

The SCA risk aggregation symbol was inconsistent across the Results page.

SCA-24282

Binary packages were not detected in some SCA scans.

AST-128613

False positive results were reported.

AST-127728

DAST artifacts were not generated when scans were triggered from CI/CD commands (GitHub Actions).

AST-127606

CVEs with High severity scores were displayed as Medium.

AST-127151

A DAST SQL Injection (SQLite, time-based) finding was reported as a false positive when the response was blocked by a WAF.

AST-124558

The associated project count in the default policy was higher than the tenant’s total number of projects.

AST-124176

Container scan results did not appear in the scan summary or project overview.

AST-124049

The monorepo-symlink-test package (version 0.0.0) was incorrectly flagged as malicious.

AST-124040

DAST reports could not be generated for scans with zero results.

AST-123244

The npm-cli-docs package (version 0.1.0) was incorrectly marked as malicious.

AST-123237

The pistache-io package (version 0.0.0) was incorrectly marked as malicious.

AST-121651

The scan summary displayed incorrect scan results.

AST-120562

The d3-pprof package (version 2.0.0) was incorrectly flagged as malicious.

AST-118571

The simple-app-subdir container image was incorrectly flagged during container scans.

AST-117610

The Sysdig integration displayed an unexpected “container” status.

AST-116878

The Docker–Checkmarx integration did not function as expected.

AST-115893

An incorrect package version was flagged as malicious.

AST-115376

IaC aggregated issues were missing from Jira tickets created via the Jira Feedback app.

AST-114414

The Jira integration used a deprecated REST API endpoint.

AST-113179

The Container Images API returned intermittent server errors.

AST-109742

Vulnerable packages shown in scan results did not match those in the project overview.

SCA-24962

SCA scans failed due to an internal worker error.

SCA-24872

SCA scans did not detect vulnerabilities in log4j version 1.2.14 due to binary recognition limitations.

SCA-24680

Licenses were reported as incorrect or missing.

SCA-24292

SCA risk aggregation indicators were inconsistent across the results page.

SCA-24282

Binary packages were not detected in some scans.

AST-94350

Projects failed to update specific project predicates.

AST-124907

IaC reported false positives for generic secrets and passwords.

SCA-25021

The SCA “New Vulnerability Comparison Mode” defaulted to branch instead of project.

AST-128775

Multiple DAST API files stopped working after a platform update.

AST-125502

APISec message processing experienced message loss due to insufficient Global Correlator capacity.

AST-125378

The “Expression Language Injection OGNL” Java query was missing a description.

AST-125231

Project full names were not visible in the Project Migration UI.

AST-116333

Large IaC project scans became stuck during execution.

AST-115447

The apisec-kics-runner experienced out-of-memory conditions.

AST-112178

A DAST “Hidden File Found” finding was reported as a false positive.

AST-127809

Group synchronization between the General and Authorization tabs was inconsistent after a tenant rollback.

AST-120771

SAST scans were reported as failed even though they completed successfully.

AST-121016

Group filtering on the project list page did not work correctly for certain users.

AST-129663

DAST: Save button ignored the Adding Groups.

Item

Description

AST-131988

Triggering a manual scan failed with a null exception after the branch validation step.

AST-131459

Pull request decoration failed due to an illegal character in the input (%3Dfalse instead of =false), related to leftover triage comment deletion.

AST-128984

Muted results were displayed in the project popup and project overview.

AST-128186

The project conversion API did not accept a valid authentication token.

AST-126763

The Get Project API returned an incorrect response.

AST-124929

Project reports did not display the most recent scan when a new tag was applied.

AST-122322

DAST two-factor authentication failed when an incorrect secret key was provided.

AST-120579

The global scan component (“general”) showed an abnormally long execution duration exceeding several days.

AST-118999

Vulnerability remediation suggestions for base images (Postgres Alpine) were inconsistent.

AST-116032

Amazon-patched packages were incorrectly flagged as vulnerable in container scans.

AST-112523

Missing message queues were not recreated automatically after the containers service restarted.

AST-90832

Filtering the scan list by project name did not display all relevant projects.

SCA-25152

The SCA policy rules engine did not correctly evaluate the “Has a Remediation Recommendation” condition.

SCA-25077

The SAST UI did not reflect the latest updates in the build.gradle file.

SCA-25002

SCA file path viewing and download actions did not function as expected.

SCA-24757

File exclusion filter rules in CxOne did not apply correctly.

SCA-24661

SCA results processors waited excessively long for responses.

SCA-24306

The SCA packages processor experienced longer-than-expected processing times.

AST-131047

DAST vulnerabilities were not synchronized to Analytics.

AST-129908

The attack vector for SAST results was not highlighted.

AST-129279

SBOM-based SCA scans failed in a Single Tenant environment.

AST-128079

Downloading the contribution CSV file failed.

AST-127746

Schedule management was not visible in the UI even when the required feature flags were enabled.

AST-127264

Scans failed due to excessively long file names.

AST-126769

Wiz notifications for Azure repositories were not triggered correctly in Cloud Insights.

AST-125231

Project full names were not visible in the Project Migration UI.

AST-122133

A SQL sample caused incorrect lines-of-code (LOC) calculations.

AST-129351

The Query Editor failed to edit query metadata.

AST-128179

WebAudit scans became stuck with an “Error while reading EngineAgent output” message.

AST-127588

Preset names could not start with numeric characters.

AST-125707

Analytics results were incorrect when filtered by application.

AST-125679

The Analytics “Environments” filter did not work as expected.

AST-125613

The Checkmarx One SAST CSV report format lost backward compatibility.

AST-123684

Drill-down counters displayed incorrect values after multiple fixes on the same results.

AST-121577

The projectId parameter was unnecessarily required when creating application list reports.

AST-120284

A “Something Went Wrong” error appeared after scan history displayed scans from multiple branches.

AST-119877

Analytics displayed no data when filtering by a tag that existed only in older scans.

AST-116237

The “Vulnerabilities by State” analytics view opened an unfiltered table when selecting “Proposed Not Exploitable.”

Item

Description

AST-131835

The Query Editor intermittently displayed an incorrect number of results due to a pagination issue.

AST-131494

The Query Editor navigated to an incorrect location after repeated clicks on search results.

AST-131284

Analytics and Dashboards experienced long load times and persistent spinner indicators.

AST-131047

DAST vulnerabilities were not synchronized to Analytics.

AST-126452

CSV report generation triggered a panic error.

AST-122322

DAST two-factor authentication failed when an incorrect secret key was provided.

AST-94350

Some projects were unable to update specific project predicates.

SCA-25577

SPDX files generated by the export service failed official SPDX Tools validation.

SCA-25491

The AI package finder did not function as expected.

SCA-25399

The “Explore Newer Versions” button redirected users to the main screen instead of the intended location.

SCA-25378

The zlib 1.3.1 C/C++ package was incorrectly detected as the npm package esy-zlib.

SCA-25205

SCA Auto Pull Request functionality downgraded packages incorrectly.

SCA-25130

The SCA results processor stopped processing scan events during tenant deletion.

SCA-25118

The Global Inventory tab failed to load and returned a 500 error.

SCA-25084

Binary packages were not detected in certain scans.

SCA-24965

Global Inventory counters did not load at startup, resulting in incorrect export data.

AST-133137

SCA reports failed with a database error indicating a missing column (scanr.state_name) in the query.

AST-131019

SCM scans could not be re-triggered via PR comments due to an invalid model identifier error.

AST-131003

DAST Deep Scan executions failed for certain targets.

AST-130788

SAST-RM failed to provision a worker.

AST-127325

CxLink integration with GitLab Self-Hosted failed to generate an authentication token.

AST-126911

The generated contributors Excel report contained incorrect values.

AST-124922

The SourceResolverSandbox job was not scheduled by Kubernetes within the expected startup window.

AST-122411

ASCA did not detect SSRF vulnerabilities in certain scenarios.

AST-122315

ASCA did not detect file creation without file existence checks.

AST-121083

SCA scan results in the ST environment showed zero running pods.

AST-108514

The api/data_analytics/analyticsAPI/v1 endpoint did not function as expected.