- Checkmarx Documentation
- Checkmarx One
- Release Notes
- Current Multi-Tenant Version | 3.55
Current Multi-Tenant Version | 3.55
New Features and Enhancements
Contributing Developer Definition: Licensing Alignment Update
Estimated GA date: March 15
We have updated the definition of Contributing Developer in our Legal Terms & Conditions and aligned it fully with system logic and the Licensing UI to create a single, authoritative source of truth.
A Contributing Developer now explicitly includes an individual, bot, or agent, all of which are counted toward license usage according to the scenarios defined in the authoritative counting guidelines.
In addition, the Licensing UI now includes an Organization Domains field (up to 20 validated domains/subdomains) to support parent companies, subsidiaries, and associated domains. Personal email domains are not permitted.
This ensures accurate association and deduplication across complex enterprise structures.
Include Secret Detection and Repository Health in Reports
Estimated GA date: March 15
Secret Detection and Repository Health scanners are now fully supported in both Scan and Project reports. These scanners can now be included in CSV scan reports as well as in Project reports across all supported formats (PDF and JSON), bringing them to full parity with existing scanners.
You can now select Secret Detection and Repository Health when generating reports, ensuring a consistent reporting experience across all scan types. This update provides a single, consolidated view of security findings and improves visibility across your organization’s security posture.
Container Security in Global Reports
Estimated GA date: March 15
Global Reports now include Container Security results. When enabled, this scanner can be selected in the Global Report UI and is fully supported via API, with its findings included alongside existing scanners.
Custom Secret Detection Rules
Estimated GA date: March 15
We’ve introduced Custom Secret Detection Rules, enabling organizations to define, manage, and enforce tailored secret detection logic across their codebase and development workflows.
Built on the powerful CxOne Query Editor (also used by SAST and IaC), this capability allows security teams to create precise detection patterns aligned with their unique security, compliance, and governance requirements.
For more information, see Secret Detection Query Editor.
GraphQL API File Support for API Environments
Estimated GA date: March 15
API-type environments now support uploading GraphQL API definition files in addition to existing formats. Supported file types:
.graphql
.gql
This enhancement enables security testing of GraphQL-based APIs directly within API environments, expanding coverage for modern API architectures.
Bitbucket Integration: Automatic Default Branch Detection
Estimated GA date: March 15
Checkmarx One now automatically retrieves and applies the default branch when importing Bitbucket repositories. During import, the backend calls the Bitbucket API to detect the repository’s default branch and uses it for scans and PR workflows.
This enhancement simplifies repository onboarding and aligns Bitbucket behavior with other supported SCM integrations for a consistent user experience.
Code Repository Integrations: Tagging Automatic Scans Triggered by SCM Events
Estimated GA date: March 15
Assign tags to scans automatically triggered by SCM events such as pushes and pull requests.
You can now define tags - either simple values or key:value pairs - during project creation or in Project Settings and associate them with protected branches or branch wildcards.
When a scan is triggered via an SCM webhook, Checkmarx One checks whether the scanned branch matches a tagged protected branch and automatically applies the relevant tags.
This enhancement improves scan traceability, enables better categorization and reporting, and allows organizations to align scan metadata with their internal processes and policies.
IaC
IaC updates are documented in the IaC changelog.
IAM
Keycloak was upgraded to version 26.5.
New Features and Enhancements
Protected built-in administrative roles from deletion to prevent accidental privilege loss.
Added permissions for Organizational Domains Management.
Introduced support for plugin restrictions per API key.
Added new permissions for Analytics – AI Triage and Remediation.
Granted
analytics-developer-assist-viewpermission toanalytics-reports-admin.Renamed permission
assign-project-all-groupstoassign-resource-all-groupsfor clarity.Updated Project Settings Authorization tab to use Available Groups API.
Extended allowed characters in group names.
Implemented support and integration for the new Audit Trail service, including updated exchange and event schema handling.
Conducted IAM performance improvements and testing.
Resolved Issues
Resolved issue preventing CxIAM from receiving events when the new audit event was enabled.
Fixed IP restriction behavior blocking SAML users with
iam-adminrole.Resolved LDAP misconfiguration blocking the cluster and service token exchange.
Prevented duplicate LDAP configuration names.
Fixed regression where SAML users were unassigned from groups despite valid group mapper configuration.
Corrected mismatch between Realm Active Sessions and Client Active Sessions counts.
Reduced excessive open database connections and RDS limit issues.
Fixed abnormal DB calls from JDBC-based components.
Resolved issue where deleted API keys remained active.
Corrected pagination issues in API Key search results.
Fixed incorrect error message when creating a client with an existing ID.
Prevented assigning custom groups to roles when not supported.
Fixed group search issues when using underscore characters.
Restricted special characters in IDP names.
Prevented roles with special character names via API.
Fixed OAuth client creation allowing case-sensitive duplicates.
Resolved tenant owner permission loss after Azure SAML login.
Fixed OpenID login issues.
DAST
Groups Support
Note
The rollout of this feature will begin on March 8 and will be performed gradually in waves on Sundays. It will be enabled for all Multi-Tenant customers by the end of March.
Groups in DAST now function the same way they do in other scanners, serving as a form of access control rather than a tag.
When creating an environment, you can assign groups from a pre-existing list. You can also assign groups to an existing environment through its Advanced Settings.
See here for more information.
IAM Authorization for DAST Environments
DAST Environments in Checkmarx One now support IAM-based fine-grained authorization, ensuring that only users with the appropriate roles and group assignments can view, configure, or trigger environment-related actions.
Integrated DAST Results with Appication Risk Management
Estimated GA date: March 15
DAST environments associated with applications are now visible in Application Risk Management.
This enhancement improves risk visibility by consolidating DAST findings with other testing results, helping security teams more effectively prioritize vulnerabilities.
Standalone Agentic AI
Contributor Developer CSV Update
Estimated GA date: March 15
We have updated the Contributor Developer CSV export to support the new standalone developer solution. A unique developer ID is now included to enable consistent and reliable tracking across environments.
Because certain fields (such as project name, branch, contributor email, and last commit) are specific to CxOne services and not available in the standalone context, the CSV structure remains unchanged, but these fields will be populated as “NA” when not applicable.
This update ensures consistent reporting across CxOne and the standalone solution, provides a clear and accurate usage baseline for licensing and ROI tracking, and strengthens transparency and monetization governance while avoiding customer confusion.
Resolved Issues
Item | Description |
|---|---|
AST-135173 | A Proxy ZAP issue caused unexpected scanning behavior. |
AST-133253 | A protected branch check triggered an exception due to a null value in the database. |
AST-133041 | The JFrog integration URL used with CxLink was broken. |
AST-132900 | Updating project settings triggered a regex exception during access token validation. |
AST-131979 | Updating project settings triggered a regex exception during access token validation following changes to the GitHub Apps project import implementation. |
AST-131746 | The project CSV export contained duplicate project IDs entries. |
AST-130045 | Container scans failed with a “Failed to handle scan” error. |
AST-129465 | Large SCM access tokens caused a DataIntegrityViolationException. |
AST-129447 | The MongoBleed vulnerability was reported for unaffected container images. |
AST-129281 | Scans terminated after reaching the maximum timeout. |
AST-129182 | The Audit Trail API returned data only for the current year when the selected date range spanned multiple years. |
AST-127014 | CI/CD command execution failed with an error. |
AST-124911 | A UI overlay issue appeared on the Application page for the Project icon, |
AST-124161 | Azure PR decoration did not return fixed vulnerabilities and incorrectly marked recurrent vulnerabilities as new. |
AST-116921 | The Azure Container Registries integration displayed an incorrect state. |
AST-116704 | Some scans failed due to a pod heartbeat timeout. |
AST-112344 | Performance degradation caused report generation failures. |
AST-134019 | Project imports failed with “There are no repositories” or a 504 Gateway Timeout error. |
AST-136239 | The /api/projects/ endpoint did not support limits greater than 100. |
AST-134171 | The scans-applications-projects service did not function as expected. |
AST-133302 | Creating a project failed when repository information had not been properly removed from the database once a project is being deleted.pcoming |
AST-133135 | Deleting Authorization in tenants without an assigned owner returned a 500 error. |
AST-127205 | The Application Project list did not update after enabling the DA_MIGRATION_ENABLED feature flag. |