Skip to main content

Current Multi-Tenant Version | 3.55

Note

A minor update, version 3.55.1, addresses multiple issues. Refer to the Issues resolved in 3.55.1 subsection in Resolved Issues for the complete list.

New Features and Enhancements

Contributing Developer Definition: Licensing Alignment Update

Estimated GA date: March 15

We have updated the definition of Contributing Developer in our Legal Terms & Conditions and aligned it fully with system logic and the Licensing UI to create a single, authoritative source of truth.

A Contributing Developer now explicitly includes an individual, bot, or agent, all of which are counted toward license usage according to the scenarios defined in the authoritative counting guidelines.

In addition, the Domains page (in Global Settings > Settings tab) allows adding up to 20 validated domains/subdomains to support parent companies, subsidiaries, and associated domains. Personal email domains are not permitted.

This ensures accurate association and deduplication across complex enterprise structures.

Include Secret Detection and Repository Health in Reports

Estimated GA date: March 15

Secret Detection and Repository Health scanners are now fully supported in both Scan and Project reports. These scanners can now be included in CSV scan reports as well as in Project reports across all supported formats (PDF and JSON), bringing them to full parity with existing scanners.

You can now select Secret Detection and Repository Health when generating reports, ensuring a consistent reporting experience across all scan types. This update provides a single, consolidated view of security findings and improves visibility across your organization’s security posture.

Container Security in Global Reports

Estimated GA date: March 15

Global Reports now include Container Security results. When enabled, this scanner can be selected in the Global Report UI and is fully supported via API, with its findings included alongside existing scanners.

Custom Secret Detection Rules

Estimated GA date: March 15

We’ve introduced Custom Secret Detection Rules, enabling organizations to define, manage, and enforce tailored secret detection logic across their codebase and development workflows.

Built on the powerful CxOne Query Editor (also used by SAST and IaC), this capability allows security teams to create precise detection patterns aligned with their unique security, compliance, and governance requirements.

For more information, see Secret Detection Query Editor.

GraphQL API File Support for API Environments

Estimated GA date: March 15

API-type environments now support uploading GraphQL API definition files in addition to existing formats. Supported file types:

  • .graphql

  • .gql

This enhancement enables security testing of GraphQL-based APIs directly within API environments, expanding coverage for modern API architectures.

Bitbucket Integration: Automatic Default Branch Detection

Estimated GA date: March 15

Checkmarx One now automatically retrieves and applies the default branch when importing Bitbucket repositories. During import, the backend calls the Bitbucket API to detect the repository’s default branch and uses it for scans and PR workflows.

This enhancement simplifies repository onboarding and aligns Bitbucket behavior with other supported SCM integrations for a consistent user experience.

Code Repository Integrations: Tagging Automatic Scans Triggered by SCM Events

Estimated GA date: March 15

Assign tags to scans automatically triggered by SCM events such as pushes and pull requests.

You can now define tags - either simple values or key:value pairs - during project creation or in Project Settings and associate them with protected branches or branch wildcards.

When a scan is triggered via an SCM webhook, Checkmarx One checks whether the scanned branch matches a tagged protected branch and automatically applies the relevant tags.

This enhancement improves scan traceability, enables better categorization and reporting, and allows organizations to align scan metadata with their internal processes and policies.

IaC

IaC updates are documented in the IaC changelog.

IAM

Keycloak was upgraded to version 26.5.

New Features and Enhancements

  • Protected built-in administrative roles from deletion to prevent accidental privilege loss.

  • Added permissions for Organizational Domains Management.

  • Introduced support for plugin restrictions per API key.

  • Added new permissions for Analytics – AI Triage and Remediation.

  • Granted analytics-developer-assist-view permission to analytics-reports-admin.

  • Renamed permission assign-project-all-groups to assign-resource-all-groups for clarity.

  • Updated Project Settings Authorization tab to use Available Groups API.

  • Extended allowed characters in group names.

  • Implemented support and integration for the new Audit Trail service, including updated exchange and event schema handling.

  • Conducted IAM performance improvements and testing.

Resolved Issues

  • Resolved issue preventing CxIAM from receiving events when the new audit event was enabled.

  • Fixed IP restriction behavior blocking SAML users with iam-admin role.

  • Resolved LDAP misconfiguration blocking the cluster and service token exchange.

  • Prevented duplicate LDAP configuration names.

  • Fixed regression where SAML users were unassigned from groups despite valid group mapper configuration.

  • Corrected mismatch between Realm Active Sessions and Client Active Sessions counts.

  • Reduced excessive open database connections and RDS limit issues.

  • Fixed abnormal DB calls from JDBC-based components.

  • Resolved issue where deleted API keys remained active.

  • Corrected pagination issues in API Key search results.

  • Fixed incorrect error message when creating a client with an existing ID.

  • Prevented assigning custom groups to roles when not supported.

  • Fixed group search issues when using underscore characters.

  • Restricted special characters in IDP names.

  • Prevented roles with special character names via API.

  • Fixed OAuth client creation allowing case-sensitive duplicates.

  • Resolved tenant owner permission loss after Azure SAML login.

  • Fixed OpenID login issues.

DAST

Groups Support

Note

The rollout of this feature will begin on March 8 and will be performed gradually in waves on Sundays. It will be enabled for all Multi-Tenant customers by the end of March.

Groups in DAST now function the same way they do in other scanners, serving as a form of access control rather than a tag.

When creating an environment, you can assign groups from a pre-existing list. You can also assign groups to an existing environment through its Advanced Settings.

See here for more information.

IAM Authorization for DAST Environments

DAST Environments in Checkmarx One now support IAM-based fine-grained authorization, ensuring that only users with the appropriate roles and group assignments can view, configure, or trigger environment-related actions.

Integrated DAST Results with Appication Risk Management

Estimated GA date: March 15

DAST environments associated with applications are now visible in Application Risk Management.

This enhancement improves risk visibility by consolidating DAST findings with other testing results, helping security teams more effectively prioritize vulnerabilities.

Standalone Agentic AI

Contributor Developer CSV Update

Estimated GA date: March 15

We have updated the Contributor Developer CSV export to support the new standalone developer solution. A unique developer ID is now included to enable consistent and reliable tracking across environments.

Because certain fields (such as project name, branch, contributor email, and last commit) are specific to CxOne services and not available in the standalone context, the CSV structure remains unchanged, but these fields will be populated as “NA” when not applicable.

This update ensures consistent reporting across CxOne and the standalone solution, provides a clear and accurate usage baseline for licensing and ROI tracking, and strengthens transparency and monetization governance while avoiding customer confusion.

Resolved Issues

Item

Description

AST-135173

A Proxy ZAP issue caused unexpected scanning behavior.

AST-133253

A protected branch check triggered an exception due to a null value in the database.

AST-133041

The JFrog integration URL used with CxLink was broken.

AST-132900

Updating project settings triggered a regex exception during access token validation.

AST-131979

Updating project settings triggered a regex exception during access token validation following changes to the GitHub Apps project import implementation.

AST-131746

The project CSV export contained duplicate project IDs entries.

AST-130045

Container scans failed with a “Failed to handle scan” error.

AST-129465

Large SCM access tokens caused a DataIntegrityViolationException.

AST-129447

The MongoBleed vulnerability was reported for unaffected container images.

AST-129281

Scans terminated after reaching the maximum timeout.

AST-129182

The Audit Trail API returned data only for the current year when the selected date range spanned multiple years.

AST-127014

CI/CD command execution failed with an error.

AST-124911

A UI overlay issue appeared on the Application page for the Project icon,

AST-124161

Azure PR decoration did not return fixed vulnerabilities and incorrectly marked recurrent vulnerabilities as new.

AST-116921

The Azure Container Registries integration displayed an incorrect state.

AST-116704

Some scans failed due to a pod heartbeat timeout.

AST-112344

Performance degradation caused report generation failures.

AST-134019

Project imports failed with “There are no repositories” or a 504 Gateway Timeout error.

AST-136239

The /api/projects/ endpoint did not support limits greater than 100.

AST-134171

The scans-applications-projects service did not function as expected.

AST-133302

Creating a project failed when repository information had not been properly removed from the database once a project is being deleted.pcoming

AST-133135

Deleting Authorization in tenants without an assigned owner returned a 500 error.

AST-127205

The Application Project list did not update after enabling the DA_MIGRATION_ENABLED feature flag.

Issues resolved in 3.55.1

AST-139206

Downloading the contributors CSV file returned a 504 (Bad Gateway) error.

AST-136263

Bulk state change operations through /api/sast-results-predicates/ returned a 504 Gateway Timeout error.

AST-136224

The SAST worker failed to retrieve scan information from the SastScanIncService.

AST-135913

The importer process remained stuck indefinitely in a running state.

AST-135087

Clone and fetch operations returned HTTP 429 (Too Many Requests) responses without a retry mechanism.

AST-133554

Tenant import queries ended with an error.

AST-133340

PR decoration results from the SAST scanner were inconsistent.

AST-133167

Retrieving SCM settings from configuration failed, causing scan failures.

AST-131792

Scans failed during source fetching with ErrCode=34050 due to branch clone errors.

AST-130224

SAML users were unassigned from all groups despite valid group mapper and IdP attributes.

AST-129205

The Scans API did not validate license constraints when creating scans.

AST-126482

All API keys were deleted when logging off active sessions.

AST-125702

The sast-results-management-writer component experienced a memory leak.

AST-124921

The JWKS URL value in OIDC settings was overwritten with “false.”

AST-123854

Scans failed with a “Failed to run filesystem scan” error in 2MS.

AST-123729

A JDBC-based component generated an abnormal number of database calls from the IAM service.

AST-135077

Existing SAML configurations lost the NameID Policy Format and Principal Type values.

AST-123546

The “User is idle” attribute ignored user activity and terminated active sessions.

AST-134351

The GET scan-summary API intermittently returned a 500 Internal Server Error.

AST-136080

Users with manage-clients permissions did not have access to the IAM UI.

AST-132786

Preset operations failed after import with a “failed to load system presets” error.

AST-134821

Opening query details removed the query from a custom preset in preset management.

AST-125058

SCA scan reports did not display results when filtered by Status “New.”

AST-134785

Report generation failed with a “Failed getting SastResults From Stream” error.

AST-128248

IAM Roles were not visible and returned a 404 error.

AST-120771

SAST scans were marked as engine failed even though the scan completed successfully.

SCA-26036

Uploading the message body to the ShareRedisS3Bucket failed.

SCA-26019

CycloneDX SBOM exports did not include scan tags and project tag values.

SCA-25247

Delta scans executed even after adding Configuration Registries.

SCA-25199

SCA reports generated blank output for scans with no-risk results.