- Checkmarx Documentation
- Checkmarx SAST
- SAST Release Notes
- Engine Pack Versions and Delivery Model
- Engine Pack Version 9.7.6
- Accuracy Gains: Enhancements in False Positive Reduction and New True Positive Coverage
Accuracy Gains: Enhancements in False Positive Reduction and New True Positive Coverage
False Positive Reduction
JavaScript — SQL Injection: Added
Find_Parameterized_SQL_Strings()exclusion at the sink level — queries built with parameterized strings are no longer flagged, removing a common FP class in Node.js apps.Python — Code Injection: Pandas sinks are now excluded from the generic Code Injection sink list (
Find_Pandas_Code_Injection_Outputssubtracted before flow calculation), preventing Pandaseval()/query()flows from being incorrectly reported as general code injection. Sanitizer support also added viaFind_Code_Injection_Sanitizers().JavaScript — Stored XSS: Stored input source detection unified into
NodeJS_Find_Stored_Inputs()helper (excluding local inputs), replacing an explicit fragmented list of DB output methods — improves precision of stored flow tracking and reduces noise from local variable sources.iOS — Third Party Keyboard:
Find_Swift_Third_Party_Keyboard_Enabledrefactored to use a newFind_Swift_Third_Party_Keyboard_Safe_Application_Methodshelper for proper exclusion of safe methods, reducing FPs where the keyboard restriction was correctly implemented.
New True Positive Coverage
Go
Server-Side Template Injection (Critical): New query for Go
html/template/text/templateunsafe construction — previously undetected attack surface.LDAP Injection & Stored LDAP Injection (High): New queries; Go LDAP libraries had no coverage in v974.
XPath Injection & Stored XPath Injection (Medium): New queries with dedicated sink and sanitizer helpers.
Dangerous File Inclusion & Stored variant (High/Medium):
plugin.Openandtemplate.ParseFilesnow tracked as sinks.20+ medium/low-visibility checks (CSRF, Insecure TLS, Cookie Overly Broad Path, Heap Inspection, Missing Framing Policy, Insufficient Session Expiration, Off-by-One Error, etc.): Go was missing these checks that already existed in other languages.
Python
Pandas Code Injection & Stored variant (Critical):
pandas.DataFrame.query()andpandas.eval()are now tracked as code injection sinks — data analysis pipelines passing user input to these methods are now detected.FastAPI Sources: New
Find_FastAPI_Inputs/Find_FastAPI_Outputshelpers mean FastAPI route parameters are now correctly identified as taint sources for all vulnerability queries.
Java / JavaScript / Go — LLM Data Exposure
Privacy_Violation_in_LLM, PCI_Data_Exposure_to_LLM, Secret_Leak_to_LLM: New queries detecting PII/secrets/PCI data flowing to LLM APIs (OpenAI, Anthropic Claude, GitHub Copilot, Google Gemini) — a previously uncovered data exfiltration channel.
CSharp / Go / Java / JavaScript / Python — Post-Quantum Cryptography
Weak_Post_Quantum_Cryptography: Detects use of quantum-vulnerable algorithms (RSA, ECDSA, AES, SHA-1/2/3) where PQC-safe alternatives are required.
Compliant_Post_Quantum_Cryptography: Confirms correct use of PQC-safe algorithms (ML-KEM, ML-DSA) for compliance verification.
Source / Sink / Sanitizer Gaps Closed
Go — ORM coverage: 5 previously unsupported database frameworks now covered (GORM, Meddler, PostgreSQL driver, standard
database/sql, Cassandra improvements). SQL Injection queries through these ORMs were producing no results in v974.JavaScript — Stored sources:
NodeJS_Find_Inputs()now includesNodeJS_Find_Stored_Inputs()(replacesNodeJS_Find_Read()), meaning all queries that call this helper gain stored-source taint tracking automatically.Python — Stored sources:
Find_Inputs()now includesFind_Stored_Inputs(), extending stored-source coverage to all Python queries depending on this helper.PHP — CLI inputs:
Find_Local_Inputs(renamed fromFind_Interactive_Local_Inputs) no longer gates CLI input sources behind theuseConsoleInputsflag —argv,stdin,readlineare always tracked, closing a gap in CLI PHP application coverage.Rust — Stored local inputs: New
Find_Stored_Local_Inputshelper;Find_Stored_Inputsnow conditionally includes it, correctly separating remote-stored from local-stored input sources for more accurate taint scoping.Common — Hardcoded secrets:
Find_Secret_Info,Find_General_Tokens,Find_Hardcoded_Key_Sanitizersupdated with broader token/secret patterns, improving detection rate for hardcoded key and cryptographic key queries across all languages.
Severity Corrections
JavaScript — Privacy_Violation_in_JWT: Moved from
Low_Visibility→Medium_Threat.Go — PCI_Data_Exposure_in_JWT, Privacy_Violation_in_JWT, Secret_Leak_in_JWT: Moved from
Low_Visibility→Medium_Threat.Lua — PCI_Data_Exposure_in_JWT, Privacy_Violation_in_JWT: Moved from
Low_Visibility→Medium_Threat.