Skip to main content

Version 3.45 | September 14, 2025

New Features and Enhancements

New Email Address for Notifications

Email notifications sent by Checkmarx One Feedback Apps are now sent from notifications@checkmarx.com. This replaces the address “ast-bot@checkmarx.com” that had been used previously. Please adjust your mail filters accordingly.

Compliance Column

The DAST results viewer now has a compliance column. After a scan, vulnerabilities are tagged with their relevant compliance standards. You can filter the results viewer according to a vulnerability’s compliance tag or generate specific compliance reports in PDF or JSON formats.

Scheduled Scans

When creating a new project, you can now set up automated scan schedules. The new Schedules Management page gives you a single place to create, edit, and monitor schedules, helping you ensure regular code analysis without manual effort.

Note

This feature will only be available for accounts with the new Access Management (Phase 1) activated.

Connect Feedback Apps via CxLink

You can now connect Feedback Apps to a self-hosted Jira instance via CxLink. During the Feedback App configuration, just enter the CxLink in place of the regular Jira URL. CxLink will act as a proxy, to ensure secure communication between Jira and Checkmarx One.

Git Blame Integration in Risk Management

We’ve added Git blame information to the Application Risk Management table for the IaC engine, making it easier to see who made specific code changes. A new dedicated column shows the author of each change, helping you better understand ownership and context when reviewing risks.

This update also improves risk prioritization by letting you focus on the changes with the highest potential impact. In addition, having Git blame details available speeds up incident investigations and makes communication with the right team members simpler.

The enhancement includes updates to the Risk Management API and introduces a new Git Blame API for accessing this data programmatically.

BYOR (Bring Your Own Repository): Multiple Imports and Abort Option

You can now manage imports more efficiently with enhanced flexibility. Users can start imports for different projects in parallel while another import is in progress. For the same project, a new import can only begin once the current one is completed or aborted.

Additionally, you can now abort an ongoing import at any time, ensuring that no partial or incorrect data is saved. This update improves control, reduces waiting times, and makes handling multiple projects faster and more convenient.

API for Bulk SAST Predicates

We added a new endpoint for retrieving SAST predicates in bulk, enabling retrieval of all predicates for a particular project or scan with a single API call. There is an option to retrieve the complete history or only the current state of each predicate.For more info, see our API documentation.

Configurable Threshold for Incremental Scans

You now have the flexibility to control the incremental scan trigger threshold for SAST scans at both the tenant and project levels. Previously, the threshold was fixed at 7%, meaning any code change above that size automatically triggered a full scan.

With this enhancement, you can define your own threshold using the new Incremental Threshold setting, available in General Settings and in Project Settings under Rules. The threshold can be set anywhere between 0.5% and 10% in 0.5% intervals.

By customizing this value, you can better optimize scan performance for large monorepos and high-volume projects, reducing unnecessary full scans while maintaining accuracy.

Note

Project-level configurations override tenant-level settings.

Communicate with Checkmarx via PR Comments

You can now communicate with Checkmarx One by adding comments in the PR decoration. This enables you to ask Checkmarx One for more details about risks in your project or request a re-scan of your code. Currently supported only for GitHub repos.

For more information, see documentation.

DAST Authentication Report

As part of onboarding, you will receive an Authentication Report. It gives you a clear overview of your authentication setup, complete with key insights and screenshots, so your team can make informed decisions right from the start.

Agentic AI Developer

The new Checkmarx One Developer Assist feature empowers developers to identify risks in their code in realtime and harness the power of AI to remediate the risks on the spot. This feature is initially released as part of the Checkmarx One plugin for VS Code, Cursor and Windsurf IDEs.

Note

This feature is only available for accounts with the Checkmarx One Assist license.

CxOne Assist comprises two main elements:

  • Realtime Scanning - Identify vulnerabilities in realtime during IDE development of both human-generated and AI-generated code. Our super-fast scanners run in the background whenever you open or edit a relevant file. Our scanners identify vulnerabilities and unmasked secrets in your code. We also identify vulnerable or malicious container images and open source packages used in your project. Results are marked as Problems which are highlighted in the code and annotated with identifying icons.

  • Agentic-AI Remediation – Initiate an Agentic-AI session to receive remediation suggestions. Checkmarx feeds all relevant info to the AI agent which accesses our MCP server to gather data from our proprietary databases and customized AI models. The AI assistant then uses this data to generate remediated code for your project. You can accept the suggested changes or you can chat with the AI agent to learn more about the vulnerability and fine-tune the remediation suggestion.

For more information, see documentation.

SCA

SBOM Supported Formats

We added support for SPDX version 2.3.

SBOM reports generated by Checkmarx One in SPDX format now use version 2.3. When submitting SBOM files to be scanned, we now support both version 2.2 and 2.3.

Show Exploitable Method Details

On the Risk Details page for SCA results, we now show details about the vulnerable methods that expose the vulnerability to exploitation. When the relevant details are available, we show the vulnerable file path, class, and method. This visibility increases transparency into how we evaluate exploitable paths, and provides actionable data for cases where full exploitable path analysis is not possible.

IaC

IaC has been upgraded to version 2.1.13.

IAM

SCM | Assign Groups in Project Creation Aligned with IAM

This feature ensures that during project creation, via both UI and API, the groups assigned to a project are limited to those the user has permissions for. It strengthens IAM alignment and avoids incorrect access configuration, enhancing security and consistency across the platform.

Note

This feature is only available for accounts using new Access Management.

Custom States in Analytics and Feedback Apps

Custom states are now supported in Analytics and Feedback Apps. You can use them to refine tracking, reporting, and insights based on your specific workflows.

Note

This feature is only available for accounts in IAM Phase 1 using Custom States.

CLI and Plugins Releases of August 2025

CLI Version 2.3.33

Status

Item

Description

NEW

Gl SAST Report

Added additional info to the gl-sast report, used in GitLab integration.

CLI Version 2.3.32

General improvements and bug fixes.

CLI Version 2.3.31

Status

Item

Description

UPDATED

Comment Mandatory

When triaging SAST results, in order to change the state to Not Exploitable or Proposed Not Exploitable, it is now mandatory to submit a comment.

Tip

This feature will only be activated for customers who specifically request it from their support agent.

NEW

Use Gitignore flag

We added the flag --use-gitignore for the scan create command. When this flag is submitted, Checkmarx One excludes files and directories from the scan based on the patterns defined in the directory's .gitignore file. For more information, see documentation.

NEW

JSON results report fields

Added additional fields to the json scan results report.

CLI Version 2.3.30

Status

Item

Description

FIXED

Http Proxy Variable

Environment variable http_proxy in lower case is now accepted as valid.

CI/CD Plugins

In August we released the following CI/CD plugin versions:

Improvements and Bug Fixes

Status

Item

Platform

Description

NEW

Container Security

GitHub

Added support for running local Container Security scans on private container registries.

UPDATED

README File

Jenkins

Updated the README file.

UPDATED

Checkmarx Logo

Jenkins

Updated the Checkmarx Logo

IDE Plugins

In August we released the following IDE plugin versions:

  • Visual Studio - 4.4.8 (uses CLI v2.3.33)

  • VS Code - 2.35.0 2.36.0 2.37.0 2.38.0 (uses CLI v2.3.31, v2.3.32 and v2.3.33 respectively)

  • Jetbrains -2.2.5 2.2.6 (uses CLI v2.3.28 and v2.3.33 respectively)

  • Eclipse - 2.1.12 (uses CLI v2.2.33)

Improvements and Bug Fixes

Status

Item

Platform

Description

UPDATED

Grouping Options

Visual Studio

In the Checkmarx One results navigation pane, the number of vulnerabilities is now shown for each grouping. Also, we added additional option for grouping results. New grouping options are: State (new or recurrent), Language (for SAST), Direct Dependency (for SCA).

UPDATED

Checkmarx Logo

Visual Studio, Jetbrains, Eclipse

Updated the Checkmarx logo.

UPDATED

README File

Visual Studio, Eclipse

Updated the content of the README.md file

NEW

Proxy Server

VS Code

Added support for setting up a proxy server for communicating with Checkmax One.

For more info, see documentation

NEW

Checkmarx One Dev Assist

VS Code

We have added Checkmarx One Developer Assist to the VS Code plugin. This new tool empowers developers to identify risks in their code in realtime and harness the power of AI to remediate the risks on the spot.

CxOne Assist comprises two main elements:

  • Realtime Scanning - Identify vulnerabilities in realtime during IDE development of both human-generated and AI-generated code. Our super-fast scanners run in the background whenever you open or edit a relevant file. Our scanners identify vulnerabilities and unmasked secrets in your code. We also identify vulnerable or malicious container images and open source packages used in your project. Results are marked as Problems which are highlighted in the code and annotated with identifying icons.

  • Agentic-AI Remediation – Initiate an Agentic-AI session to receive remediation suggestions. Checkmarx feeds all relevant info to the AI agent which accesses our MCP server to gather data from our proprietary databases and customized AI models. The AI assistant then uses this data to generate remediated code for your project. You can accept the suggested changes or you can chat with the AI agent to learn more about the vulnerability and fine-tune the remediation suggestion.

NEW

SCA Scanner

Jetbrains

Added a filter to hide vulnerabilities identified by the SCA scanner in "Dev" and "Test" dependencies. Learn more here

NEW

Oauth

Jetbrains

We added the option to connect the JetBrains extension to your Checkmarx One account using an OAuth login flow. If you select this option, you will need to submit the base URL of your system and your Tenant Name. You can then log in using your Username and Password or via SSO.

Notice

The option to connect via an API Key is still supported. However, if you had previously submitted an API Key, after installing this version of the extension you will need to re-submit your API Key.

NEW

CWE Links

Jetbrains, Eclipse

In the Learn More and Remediation Examples sections for specific results, we now give a link to the relevant CWE page.

UPDATED

Triage

Jetbrains, Eclipse

In the "Triage" section, changed the terminology from "comments" to "notes".

Resolved Issues

Item

Description

AST-109465

PDF reports failed to generate for scans with a large number of results.

AST-108316

GetComparisonResultsChan executed a very long SQL query.

AST-107328

ASA Premium preset did not appear in the list when editing a project.

AST-105892

Analytics Dashboard filters mismatched when selecting applications.

AST-102419

Projects Overview – Aging Summary displayed incorrect information.

AST-100897

PUT /api/projects: Users with project-level access could assign/unassign at the application level without permission.

AST-100758

Import project failed after aggregating SCM access tokens for self-hosted GitHub.

AST-100669

Recorder did not work during onboarding.

AST-99571

Jira feedback app failed when Jira was set to Spanish.

AST-99562

Project was assigned to multiple applications when application-level custom queries were used.

AST-99553

/api/sast-results returned 504 Gateway Timeout.

AST-95930

Duplicate projects were returned by “Get a list of projects” API endpoint.

AST-91408

Notes popup window truncated URLs.

AST-109938

New IAM UI: Login & Session Management tab was visible to users with default permissions.

AST-109135

URL-encoded attack vector was not highlighted.

AST-106133

SCM integration (Bitbucket): Previously onboarded repositories reappeared as new.

AST-105687

resultViewerLink URL inside JSON scan report was incomplete or broken.

AST-103580

Global Report from Analytics did not show group names.

AST-103519

Import code repository API timed out with large numbers of repositories.

AST-100722

[IaC] Runtime error occurred: panic: index out of range.

AST-98823

[IaC] Query update issue with “Website with Client Certificate Auth Disabled (ARM)”.

AST-98730

Swagger docs for /api/sast-results/ sort parameter did not match execution behavior.

AST-96743

Documentation update was needed for integrating forked GitHub projects.

AST-95111

IaC preset: CloudFormation vulnerability had incorrect severity.

AST-94942

IaC false positive: S3 bucket access was flagged as open to any principal.

AST-94482

SAML configuration documentation was outdated (based on old IAM UI) and unclear for generic IdPs.

AST-94164

Proxy Disclosure issue: highlighting did not display.

AST-93478

Error occurred: “Remote backend is unreachable.”

AST-92827

“ReposManager generic exception” error was displayed frequently.

AST-81967

False positive occurred for “Passwords and Secrets – Generic Token.”

AST-104517

Container Security scan result UI was unresponsive or crashed.

AST-102692

Policy rule could not be created for container security scanner.

AST-102333

Edit package window did not close properly.

AST-107570

Tags in name:value format did not display when creating a new manual project.

AST-107477

Scans failed with “deadline exceeded” error in sources-processor.

SCA-23916

AST scan service did not return results to SCA.

SCA-23878

Two CVEs were added but only one email notification was sent.

SCA-23846

Global Inventory GraphQL endpoint returned 504.

SCA-23785

Global Inventory failed consistently.

SCA-23385

Incorrect licenses were associated with org.jruby:jruby-complete and org.jruby:jruby-core.

SCA-23559

Generated SCA scan reports contained discrepancies.

AST-109347

OS Vulnerabilities false positives occurred in Amazon Linux PCRE2 package 10.40-1.amzn2023.0.3.

AST-108481

Container Scanner detected incorrect Golang version (1.24 instead of 1.24.5).

AST-108392

Snoozed or muted container vulnerabilities still appeared in reports.

AST-108323

containers-results-processor generated excessive irrelevant logs.

AST-107997

“NONE” distribution in resolution JSON caused scan failures.

AST-107979

Container Security results were inconsistent between Scan Summary and Result Viewer.

AST-106967

RockyLinux 8.9 image was missing multiple packages.

AST-106943

musl-utils package was not detected in Alpine 3.9.4 image.

AST-105913

SBOM report generation for containers failed.

AST-102319

Containers CVE issue: UBI 8.10 image base was incorrectly marked as critical.

AST-101261

Vulnerabilities reported for OpenLDAP package differed between scans.

AST-99828

Error occurred when analyzing singlestore/cluster-in-a-box:latest image