Skip to main content

Current Multi-Tenant Version | 3.56

New Features and Enhancements

General Availability: March 29, 2026

New Audit Log API with Expanded Event Coverage

Checkmarx One has launched a new audit log service with expanded coverage for a wide range of events across the platform. The new audit log is accessed using a new (REST) API, GET /audit-events. The new service adds new events for existing coverage for the Core platform and IAM (user management), and introduces logging for new areas, including Back Office and several scanners:

  • SCA

  • Container Security

  • DAST

  • BYOR

These improvements provide broader visibility into platform activity and strengthen auditability for security monitoring, compliance, and governance. Due to the expanded coverage, customers should expect a significant increase in the volume of audit events.

This API will replace the current Audit Trail REST API. The deprecated API will remain available for a 6 month transition period prior to being removed. We recommend taking steps to transition to the new audit log API as soon as possible.

Reports: Local Time Zone

Checkmarx One reports now display date-time values based on the user’s local time zone (instead of UTC). The applied time zone appears in the report header, and all date-time fields are adjusted accordingly.

  • When reports are generated through the UI, the browser’s time zone is applied automatically.

  • When generated via API, a time zone can be specified in the request body; otherwise, UTC is used by default.

Project Reports: Results Distribution

Project reports now include a Results Distribution section with tables showing vulnerability distribution by status and state. This provides clearer visibility into workflow classification and improves report completeness, readability, and governance reporting.

The structure also aligns with SAST on-premises reports, improving the user experience for customers migrating to Checkmarx One.

CxLink: Improved Kubernetes and Docker Setup Instructions

The CxLink UI now provides enhanced setup instructions for Kubernetes environments, including examples for creating a Kubernetes secret to store Link credentials and a pod definition for running the Link client image.

In addition, Docker setup instructions have been updated to support using an environment file instead of passing secrets directly via the command line.

CxLink: More Secure Docker Setup Instructions

The CxLink UI now provides updated Docker setup instructions that avoid passing secrets as command-line arguments. Instead, users create a local .env file to store sensitive values such as the Link token and tunnel name, and reference them when running the container.

Mandatory Comment When Changing a Result State

To improve traceability and auditability of changes, users are now required to provide a comment when changing the state of a result.

Policy Management: Public API to Assign Projects to Policies

Checkmarx One now provides a public Assign Project to Policy API for assigning projects to policies.

You can use this API in combination with existing endpoints to implement bulk assignment logic. For example:

  1. Retrieve policies via the Retrieve all policies API.

  2. Extract relevant tags associated with each policy.

  3. Retrieve projects using the Retrieve list of projects API filtered by those tags.

  4. Assign each project to the appropriate policy using the new Assign Project to Policy API

IAM: Tenant-Level IP Restrictions

Checkmarx One now supports IP allowlisting at the tenant level, enabling IAM Admins to restrict platform access to specific IP addresses or CIDR ranges.

Admins can configure up to 10 IPv4 entries in the IAM settings. During login, the user’s origin IP is validated before authentication. Access is granted only if the IP matches the allowlist. IAM Admins and service accounts are always allowed, ensuring uninterrupted administration and automation.

For more information, see Restricting IP Addresses

SCA

Delta Scan via CLI

Checkmarx One CLI scans now support Delta Scan resolution when running SCA scans via the CLI with SCA Resolver. Delta Scan now runs by default when rescanning an existing project, significantly reducing scan time. You can override this behavior by using the --sca-resolver-params flag with the --disable-delta-scan argument. This enhancement improves scan efficiency and accelerates feedback during repeated scans.

Requirements (minimum versions for this functionality):

  • CLI version 2.3.44 and above

  • SCA Resolver version 2.13.3 and above

SCA Results Viewer Alignment

Results from the SCA scanner are now presented using the same shared UI components and interaction patterns used by other scanners. The Packages, Risks and License views now support consistent navigation, filtering, searching, and drill-down views, aligning the SCA experience with other Checkmarx One results viewers.

This alignment improves usability and consistency across scanners, making it easier for users to analyze SCA findings alongside results from other Checkmarx One scanners.

New SCA Composite Risk Score – CxScore

Checkmarx One has introduced a new metric, CxScore, for SCA vulnerabilities. CxScore improves remediation prioritization by providing a composite score that better reflects the actual risk posed by a vulnerable package. The score is calculated using multiple risk factors, including CVSS 3.0 and 4.0 (when available), EPSS score, dependency type (direct or transitive), and the presence of an exploitable path.

CxScore is automatically calculated whenever scans complete or when relevant CVE data changes. The score is now available across SCA views, including Packages, Risks, Risk Details, and Global Inventory. The existing Risk Score (based solely on CVSS) remains available, and users can toggle between Risk Score and CxScore in relevant views. CxScore is also included in exported reports (JSON, XML, and CSV) and can be used in policy rules to define vulnerability thresholds.

By incorporating additional risk intelligence and contextual factors, CxScore provides a more holistic vulnerability prioritization model and improves visibility into application security risk across the organization.

IaC

IaC updates are documented in the IaC changelog.

DAST

Custom Scripts During Authentication

In addition to uploading your configuration files or setting up your authentication during environment setup, you can use your own custom scripts during authentication. This is especially useful for users who have authentication secrets that change dynamically.

‘Systemic’ Label for Vulnerabilities

Instances of vulnerabilities shown in the Results Table (Vulnerability View) are now labeled as Systemic when they are detected across multiple parts of the system during a scan. Previously, this view displayed the number of individual instances in which the vulnerability appeared.

This update groups systemic vulnerabilities by their Similarity ID rather than by node or URL, improving consistency across scans and reducing memory overhead.

This change will cause all instances of a systemic alert to appear as New in the first scan after the update, even if they had been identified in earlier scans. In subsequent scans, if the issue has not been resolved, these alerts will appear as Recurrent.

Resolved Issues

Item

Description

AST-139206

Downloading the contributors CSV file returned a 504 (Bad Gateway) error and an empty file.

AST-138253

“Over time” view type for a selected Application with Vulnerabilties in Analytics and Dashboard page resulted in a 504 Gateway Timeout error.

AST-136466

The Application Overview page entered a continuous 404 loop, affecting all applications.

AST-136263

Bulk state change operations through /api/sast-results-predicates/ returned a 504 Gateway Timeout error.

AST-136262

The “Automatically Sync” toggle in Global Settings did not function as expected.

AST-136224

The SAST worker failed to retrieve scan information from the SastScanIncService.

AST-136168

The Analytics Executive Overview displayed inconsistent kLoC values when using the “All States” filter.

AST-135913

The importer process remained stuck in a running state indefinitely.

AST-135440

Filtering by scanner type in the Analytics Engineering Overview did not work.

AST-135087

Clone and fetch operations returned HTTP 429 (Too Many Requests) responses without a retry mechanism.

AST-133909

A specific project generated reports with no results despite recent scans containing SCA and SAST findings.

AST-133554

Tenant import queries ended with an error.

AST-133340

PR decoration results from the SAST scanner were inconsistent.

AST-133246

The ASPM panel was missing despite appropriate permissions being assigned.

AST-133167

Retrieving SCM settings from configuration failed, causing scan failures.

AST-133112

Customized scan reports did not correctly reflect excluded result states.

AST-132753

The Analytics dashboard was missing the “All Projects/Applications” filter.

AST-130224

SAML users were unassigned from all groups despite a valid group mapper and IdP attributes.

AST-129488

Reports per application were generated with incorrect data.

AST-129205

The Scans API did not validate license constraints when creating scans.

AST-128159

CxLink metadata treated private URLs with a trailing slash as different values.

AST-126482

All API keys were deleted when logging off active sessions.

AST-125702

The sast-results-management-writer component experienced a memory leak.

AST-124921

The JWKS URL value in OIDC settings was overwritten with “false.”

AST-123854

Scans failed with a “Failed to run filesystem scan” error in 2MS.

AST-123729

A JDBC-based component generated an abnormal number of database calls from the IAM service.

AST-116673

Deleting a non-main branch scan removed fixed data from the project.

AST-135077

Existing SAML configurations lost the NameID Policy Format and Principal Type values.

AST-123546

The “User is idle” attribute ignored user activity and terminated active sessions.

AST-134351

The GET scan-summary API intermittently returned a 500 Internal Server Error.

AST-136080

Users with manage-clients permissions did not have access to the IAM UI.

AST-132786

Preset operations failed after import with a “failed to load system presets” error.

AST-125058

SCA scan reports did not display results when filtered by Status “New.”

AST-137248

Documentation for reports focusing on production branches was incomplete or unclear.

AST-135881

Token refresh operations failed due to insufficient timeout configuration.

AST-134785

Report generation failed with a “Failed getting SastResults From Stream” error.

AST-130993

Configuration templates generated warnings due to the deprecated yaml.safeLoad function.

AST-128248

IAM Roles were not visible and returned a 404 error.

AST-125608

Adding rules from project settings for file or folder values did not work as expected.

AST-120771

SAST scans were marked as engine failed even though the scan completed successfully.

SCA-26036

Uploading the message body to the ShareRedisS3Bucket failed.

SCA-26019

CycloneDX SBOM exports did not include scan tags and project tag values.

SCA-25247

Delta scans executed even after adding Configuration Registries.

SCA-25199

SCA reports generated blank output for scans with no-risk results.