Skip to main content

Current Multi-Tenant Version | 3.55

New Features and Enhancements

Contributing Developer Definition: Licensing Alignment Update

Estimated GA date: March 15

We have updated the definition of Contributing Developer in our Legal Terms & Conditions and aligned it fully with system logic and the Licensing UI to create a single, authoritative source of truth.

A Contributing Developer now explicitly includes an individual, bot, or agent, all of which are counted toward license usage according to the scenarios defined in the authoritative counting guidelines.

In addition, the Licensing UI now includes an Organization Domains field (up to 20 validated domains/subdomains) to support parent companies, subsidiaries, and associated domains. Personal email domains are not permitted.

This ensures accurate association and deduplication across complex enterprise structures.

Include Secret Detection and Repository Health in Reports

Estimated GA date: March 15

Secret Detection and Repository Health scanners are now fully supported in both Scan and Project reports. These scanners can now be included in CSV scan reports as well as in Project reports across all supported formats (PDF and JSON), bringing them to full parity with existing scanners.

You can now select Secret Detection and Repository Health when generating reports, ensuring a consistent reporting experience across all scan types. This update provides a single, consolidated view of security findings and improves visibility across your organization’s security posture.

Container Security in Global Reports

Estimated GA date: March 15

Global Reports now include Container Security results. When enabled, this scanner can be selected in the Global Report UI and is fully supported via API, with its findings included alongside existing scanners.

Custom Secret Detection Rules

Estimated GA date: March 15

We’ve introduced Custom Secret Detection Rules, enabling organizations to define, manage, and enforce tailored secret detection logic across their codebase and development workflows.

Built on the powerful CxOne Query Editor (also used by SAST and IaC), this capability allows security teams to create precise detection patterns aligned with their unique security, compliance, and governance requirements.

For more information, see Secret Detection Query Editor.

GraphQL API File Support for API Environments

Estimated GA date: March 15

API-type environments now support uploading GraphQL API definition files in addition to existing formats. Supported file types:

  • .graphql

  • .gql

This enhancement enables security testing of GraphQL-based APIs directly within API environments, expanding coverage for modern API architectures.

Bitbucket Integration: Automatic Default Branch Detection

Estimated GA date: March 15

Checkmarx One now automatically retrieves and applies the default branch when importing Bitbucket repositories. During import, the backend calls the Bitbucket API to detect the repository’s default branch and uses it for scans and PR workflows.

This enhancement simplifies repository onboarding and aligns Bitbucket behavior with other supported SCM integrations for a consistent user experience.

Code Repository Integrations: Tagging Automatic Scans Triggered by SCM Events

Estimated GA date: March 15

Assign tags to scans automatically triggered by SCM events such as pushes and pull requests.

You can now define tags - either simple values or key:value pairs - during project creation or in Project Settings and associate them with protected branches or branch wildcards.

When a scan is triggered via an SCM webhook, Checkmarx One checks whether the scanned branch matches a tagged protected branch and automatically applies the relevant tags.

This enhancement improves scan traceability, enables better categorization and reporting, and allows organizations to align scan metadata with their internal processes and policies.

IaC

IaC updates are documented in the IaC changelog.

IAM

Keycloak was upgraded to version 26.5.

New Features and Enhancements

  • Protected built-in administrative roles from deletion to prevent accidental privilege loss.

  • Added permissions for Organizational Domains Management.

  • Introduced support for plugin restrictions per API key.

  • Added new permissions for Analytics – AI Triage and Remediation.

  • Granted analytics-developer-assist-view permission to analytics-reports-admin.

  • Renamed permission assign-project-all-groups to assign-resource-all-groups for clarity.

  • Updated Project Settings Authorization tab to use Available Groups API.

  • Extended allowed characters in group names.

  • Implemented support and integration for the new Audit Trail service, including updated exchange and event schema handling.

  • Conducted IAM performance improvements and testing.

Resolved Issues

  • Resolved issue preventing CxIAM from receiving events when the new audit event was enabled.

  • Fixed IP restriction behavior blocking SAML users with iam-admin role.

  • Resolved LDAP misconfiguration blocking the cluster and service token exchange.

  • Prevented duplicate LDAP configuration names.

  • Fixed regression where SAML users were unassigned from groups despite valid group mapper configuration.

  • Corrected mismatch between Realm Active Sessions and Client Active Sessions counts.

  • Reduced excessive open database connections and RDS limit issues.

  • Fixed abnormal DB calls from JDBC-based components.

  • Resolved issue where deleted API keys remained active.

  • Corrected pagination issues in API Key search results.

  • Fixed incorrect error message when creating a client with an existing ID.

  • Prevented assigning custom groups to roles when not supported.

  • Fixed group search issues when using underscore characters.

  • Restricted special characters in IDP names.

  • Prevented roles with special character names via API.

  • Fixed OAuth client creation allowing case-sensitive duplicates.

  • Resolved tenant owner permission loss after Azure SAML login.

  • Fixed OpenID login issues.

DAST

Groups Support

Note

The rollout of this feature will begin on March 8 and will be performed gradually in waves on Sundays. It will be enabled for all Multi-Tenant customers by the end of March.

Groups in DAST now function the same way they do in other scanners, serving as a form of access control rather than a tag.

When creating an environment, you can assign groups from a pre-existing list. You can also assign groups to an existing environment through its Advanced Settings.

See here for more information.

IAM Authorization for DAST Environments

DAST Environments in Checkmarx One now support IAM-based fine-grained authorization, ensuring that only users with the appropriate roles and group assignments can view, configure, or trigger environment-related actions.

Integrated DAST Results with Appication Risk Management

Estimated GA date: March 15

DAST environments associated with applications are now visible in Application Risk Management.

This enhancement improves risk visibility by consolidating DAST findings with other testing results, helping security teams more effectively prioritize vulnerabilities.

Standalone Agentic AI

Contributor Developer CSV Update

Estimated GA date: March 15

We have updated the Contributor Developer CSV export to support the new standalone developer solution. A unique developer ID is now included to enable consistent and reliable tracking across environments.

Because certain fields (such as project name, branch, contributor email, and last commit) are specific to CxOne services and not available in the standalone context, the CSV structure remains unchanged, but these fields will be populated as “NA” when not applicable.

This update ensures consistent reporting across CxOne and the standalone solution, provides a clear and accurate usage baseline for licensing and ROI tracking, and strengthens transparency and monetization governance while avoiding customer confusion.

Resolved Issues

Item

Description

AST-135173

A Proxy ZAP issue caused unexpected scanning behavior.

AST-133253

A protected branch check triggered an exception due to a null value in the database.

AST-133041

The JFrog integration URL used with CxLink was broken.

AST-132900

Updating project settings triggered a regex exception during access token validation.

AST-131979

Updating project settings triggered a regex exception during access token validation following changes to the GitHub Apps project import implementation.

AST-131746

The project CSV export contained duplicate project IDs entries.

AST-130045

Container scans failed with a “Failed to handle scan” error.

AST-129465

Large SCM access tokens caused a DataIntegrityViolationException.

AST-129447

The MongoBleed vulnerability was reported for unaffected container images.

AST-129281

Scans terminated after reaching the maximum timeout.

AST-129182

The Audit Trail API returned data only for the current year when the selected date range spanned multiple years.

AST-127014

CI/CD command execution failed with an error.

AST-124911

A UI overlay issue appeared on the Application page for the Project icon,

AST-124161

Azure PR decoration did not return fixed vulnerabilities and incorrectly marked recurrent vulnerabilities as new.

AST-116921

The Azure Container Registries integration displayed an incorrect state.

AST-116704

Some scans failed due to a pod heartbeat timeout.

AST-112344

Performance degradation caused report generation failures.

AST-134019

Project imports failed with “There are no repositories” or a 504 Gateway Timeout error.

AST-136239

The /api/projects/ endpoint did not support limits greater than 100.

AST-134171

The scans-applications-projects service did not function as expected.

AST-133302

Creating a project failed when repository information had not been properly removed from the database once a project is being deleted.pcoming

AST-133135

Deleting Authorization in tenants without an assigned owner returned a 500 error.

AST-127205

The Application Project list did not update after enabling the DA_MIGRATION_ENABLED feature flag.