Skip to main content

Upcoming Multi-Tenant Version | 3.52

Warning

The content and dates of these Release Notes are provisional and subject to change.

All new features, enhancements, and resolved issues will be available upon version deployment in the multi-tenant environment unless explicitly stated otherwise in the respective section's sub-heading.

New Features and Enhancements

Include Container Security Results in Reports

Reports now support Container Security scan results.

When generating a project or application report, you can now select the Container Security scanner alongside the existing scanner options. This delivers a unified reporting experience, presenting all scan types in a consistent format and ensuring a single, consolidated view of security insights.

Include Container Security Data in Analytics Dashboards

Analytics dashboards now show metrics from the Container Security scanner.

You can now view container-related findings and KPIs alongside existing analytics data from other scanners. This creates a unified analytics experience, giving you consistent visibility across all supported scan types.

Developer Assist Usage Dashboard

A new Developer Assist Usage dashboard is now available in Analytics (for customers with an AI license). The dashboard introduces multiple KPIs that surface how developers interact with AI-generated remediations, including AI Suggestions, Fix Clicked, and Unique Users. It also includes a donut widget that breaks down Developer Assist usage by scanner, and a bar graph showing real-time vulnerability detection by scanner.

This consolidated view improves transparency and highlights adoption trends without requiring custom reporting.

BYOR Management: Web-Based External Imports

BYOR (Bring Your Own Results) now includes a web-based import experience, making it easier and faster for customers to bring external scan results into Checkmarx One. Users can import SARIF files from the UI, associate them with projects, and track progress and status in real time.

This enhancement improves visibility and enables security teams to review issue counts and severity breakdowns immediately after import.

BYOR Import Management: Import Deletion

Customers can now delete BYOR imports and their associated results. Deletion is available for completed, failed, or canceled imports and can be performed via the UI or API, including bulk deletion where permitted.

BYOR: Vulnerability Author (Blame) Identification

BYOR imports now identify and display the author (blamer) and commit ID for vulnerabilities when this information is provided by external tools. When blame data is unavailable or invalid, the author is shown as N/A.

By parsing blame metadata directly from imported files, customers can see who introduced a vulnerability and in which commit, without relying on additional Git queries.

GitHub App Authentication Support for Code Repository Integrations

Checkmarx One now supports GitHub App–based authentication for code repository integrations as a more secure and modern alternative to Personal Access Tokens and OAuth apps. This update enables short-lived, scoped tokens, automatic token rotation, and granular permission control, significantly reducing the risk of credential leakage and simplifying integration management.

This enhancement also unlocks compatibility with GitHub Enterprise Managed Users (EMU), allowing enterprise customers with strict identity and access controls to integrate GitHub repositories.

For more information, see our Documentation Portal.

IAM: Expanded OAuth Client Character Support

The allowed character set for OAuth client identifiers has been expanded to include the @ character.

Manage Custom States in the UI

You can now create and delete custom states directly from Global Settings in the web application. After a state is defined, it becomes available tenant-wide for vulnerability triage. This streamlines configuration and removes the need to manage custom states through the API.

Note

Supported only for accounts with New Access Management.

For more information about custom states, see our Documentation Portal.

Secret Detection | Scanning Git Commit History

A new Git commit history setting in Settings > Secret Detection lets users control whether Secret Detection scans Git commit history.

When set to true (default: false), Secret Detection scans both the working tree and Git commit history, providing full historical coverage for compliance and deeper analysis.

The setting is available in:

  • UI (Global and Project Settings)

  • API (commitHistory.enabled <true|false> parameter in Secret Detection (SCS) settings)

  • CLI (--scs-commit-history=<true|false> flag).

DAST

New columns in Scans History tab

New Paths, Mode, and Initiator columns re now available in the Scans History tab.

  • The Paths column displays the number of paths found in the scan.

  • The Mode column indicates which scan mode was used. Older scans will show the default mode or remain blank if no current mode applies. Scans run with custom configurations that do not match any available mode will also appear with an empty Mode field.

  • The Initiator column shows whether the scan was initiated manually, triggered by a schedule, or launched from the DAST CLI.

Groups Support in DAST

Groups in DAST now function the same way they do in other scanners, serving as a form of access control rather than a tag.

When creating an environment, you can assign groups from a pre-existing list. You can also assign groups to an existing environment through its Advanced Settings.

For more information, see our Documentation Portal.

DAST Vulnerabilities by Alert

Added support for viewing DAST vulnerabilities by Alert on the Environments page, in addition to the existing Instance view.

Viewing by Alert aligns with industry standards by displaying the underlying vulnerability, while viewing by Instance shows how many times that vulnerability was detected.

Associate Environment to Application

Added ways to associate the application with an environment. You can now associate applications to the environment through the Environment tab, Application tab, an environment’s settings, or through the application’s Overview tab.

DAST Overview Tab

The Overview tab displays an at‑a‑glance summary of an environment, including associated applications, groups, and users; scan dates and times; and high‑level dashboards of the discovered vulnerabilities and compliance postures.

Resolved Issues

Item

Description

AST-128613

False positive results were reported.

AST-127728

DAST artifacts were not generated when scans were triggered from CI/CD commands (GitHub Actions).

AST-127606

CVEs with High severity scores were displayed as Medium.

AST-127151

A DAST SQL Injection (SQLite, time-based) finding was reported as a false positive when the response was blocked by a WAF.

AST-124558

The associated project count in the default policy was higher than the tenant’s total number of projects.

AST-124176

Container scan results did not appear in the scan summary or project overview.

AST-124049

The monorepo-symlink-test package (version 0.0.0) was incorrectly flagged as malicious.

AST-124040

DAST reports could not be generated for scans with zero results.

AST-123244

The npm-cli-docs package (version 0.1.0) was incorrectly marked as malicious.

AST-123237

The pistache-io package (version 0.0.0) was incorrectly marked as malicious.

AST-121651

The scan summary displayed incorrect scan results.

AST-120562

The d3-pprof package (version 2.0.0) was incorrectly flagged as malicious.

AST-118571

The simple-app-subdir container image was incorrectly flagged during container scans.

AST-117610

The Sysdig integration displayed an unexpected “container” status.

AST-116878

The Docker–Checkmarx integration did not function as expected.

AST-115893

An incorrect package version was flagged as malicious.

AST-115376

IaC aggregated issues were missing from Jira tickets created via the Jira Feedback app.

AST-114414

The Jira integration used a deprecated REST API endpoint.

AST-113179

The Container Images API returned intermittent server errors.

AST-109742

Vulnerable packages shown in scan results did not match those in the project overview.

SCA-24962

SCA scans failed due to an internal worker error.

SCA-24872

SCA scans did not detect vulnerabilities in log4j version 1.2.14 due to binary recognition limitations.

SCA-24680

Licenses were reported as incorrect or missing.

SCA-24292

SCA risk aggregation indicators were inconsistent across the results page.

SCA-24282

Binary packages were not detected in some scans.

AST-94350

SAP projects failed to update specific project predicates.

AST-124907

IaC reported false positives for generic secrets and passwords.

SCA-25021

The SCA “New Vulnerability Comparison Mode” defaulted to branch instead of project.

AST-128775

Multiple DAST API files stopped working after a platform update.

AST-125502

APISec message processing experienced message loss due to insufficient Global Correlator capacity.

AST-125378

The “Expression Language Injection OGNL” Java query was missing a description.

AST-125231

Project full names were not visible in the Project Migration UI.

AST-116333

Large IaC project scans became stuck during execution.

AST-115447

The apisec-kics-runner experienced out-of-memory conditions.

AST-112178

A DAST “Hidden File Found” finding was reported as a false positive.

AST-127809

Group synchronization between the General and Authorization tabs was inconsistent after a tenant rollback.

AST-120771

SAST scans were reported as failed even though they completed successfully.

AST-121016

Group filtering on the project list page did not work correctly for certain users.

AST-129663

DAST: Save button ignored the Adding Groups.