All Collections
Application Security (SCA/SAST/DAST)
Checkmarx CxSAST Connector (Rev. February 2024)
Checkmarx CxSAST Connector (Rev. February 2024)

Learn all about integrating Checkmarx CxSAST into the Vulcan Platform

Updated over a week ago

Am I reading the right user guide?

Certain connectors have more than one user guide. It depends on the environment's setup and on the connector's available releases (new vs. older revisions).

To access the relevant user guide to your environment, click on the "How to connect" button on the connector's setup page. Doing so will direct you to the user guide that aligns with your specific environment, ensuring relevancy and accuracy.


About Checkmarx CxSAST

Checkmarx Static Application Security Testing (SAST) provides fast and accurate incremental or full scans and gives you the flexibility, accuracy, integrations, and coverage to secure your applications.

Why integrate Checkmarx CxSAST into the Vulcan platform?

The Checkmarx CxSAST by Vulcan integrates with the Checkmarx CxSAST platform to pull and ingest Code Project assets and their related vulnerability data into your Vulcan Platform. Once the integration is complete, the Vulcan Platform scans the report's findings to correlate, consolidate, and contextualize the ingested data to impact risk and remediation priority.

Checkmarx CxSAST Details

Supported products


Application Security - SAST

Ingested asset type(s)

Code Projects

Integration type

UNI directional (data is transferred from the Connector to the Vulcan Platform in one direction)

Supported version and type

SaaS (latest)

Connector Setup

Prerequisites and user permissions

Before you begin configuring the Connector, make sure you have the following:

  • Checkmarx SAST server URL: URL of your Checkmarx account.

  • Username: User with required permissions to access the Checkmarx account.

    • Permissions needed: Odata API, SAST Reviewer

  • Password: Username Password

  • Client ID: The default value of your account.

  • Client Secret: The default value of your account. Insert new value only in case you know it was changed by your organization (otherwise, keep the default value).

Configuring the Checmarx CxSAST Connector

  1. Log in to your Vulcan Cyber dashboard and go to Connectors.

  2. Click on Add a Connector.

  3. Click on the Checmarx CxSAST icon.

  4. Set up the Connector as follows:

  5. Click the Test Connectivity button to verify that Vulcan Cyber can connect to your Checmarx CxSAST instance, then click Create (or Save Changes).

  6. Inactive Assets: You can configure a Vulcan rule to consider inactive assets, and Vulcan will remove assets that do not appear in scans within the configured time range.

  7. Allow some time for the sync to complete. Then, you can review the sync status under Log on the Connector's setup page.

  8. To confirm the sync is complete, navigate to the Connectors page. Once the Checmarx CxSAST icon shows Connected, the sync is complete.

Checmarx CxSAST in the Vulcan Platform

Viewing Checmarx CxSAST vulnerabilities in the Vulcan Platform

To view vulnerabilities by Connector/Source:

  1. Go to the Vulnerabilities page.

  2. Use the Search or Filter input box to select the Vulnerability Source or Connector filter.

  3. Select Checmarx CxSAST from the vulnerability source/Connector list to filter results.

  4. Click on any vulnerability for more vulnerability details.

Viewing Checmarx CxSAST assets in the Vulcan Platform

To view assets by Connector/Source:

  1. Go to the Assets page.

  2. Click on the relevant asset type tab (Code Project in this case).

  3. Use the Search or filter input box to select Connector from the drop-down selection.

  4. Select Checmarx CxSAST from the Asset source/Connector list to filter results and view all synced assets.
    See the complete list of available asset filters per asset type

Taking Action on vulnerabilities and assets detected by Checmarx CxSAST

To take remediation action on vulnerabilities and assets detected by Checmarx CxSAST:

  1. Go to the Vulnerabilities / Assets Page.

  2. Click on the Search and Filter input box and select Connector from the drop-down selection.

  3. Locate the Checmarx CxSAST option to view all synced vulnerabilities/assets.

  4. Select the relevant Vulnerability/Asset.

Automating remediation actions on vulnerabilities detected by Checmarx CxSAST

Large environments quickly become unmanageable if constant manual attention and effort are necessary to remediate vulnerabilities. You can take advantage of the automation capabilities of Vulcan Cyber and the Checmarx CxSAST Connector.

From Checmarx CxSAST to the Vulcan Platform - Data Mapping

The Vulcan Platform integrates with Checmarx CxSAST through API to pull relevant vulnerabilities and assets data and map it into the Vulcan Platform pages and fields.

Code Project fields mapping

Checmarx CxSAST field

Vulcan field

Value Example

Project id

Uniqueness criteria


Project name

Asset Name

Code Projects

Asset type



Asset codebase - Source (SAST)



Asset codebase - Location (SAST)


Application Name
Last Scan ID
Lines of code scanned in last scan
Owner of last scan
Team name

Asset details

Team Full Name

Asset Tags - Additional


last scanned date

Last seen




Vulnerability instance uniqueness criteria

Vulnerability detection date

Vulnerability instance first seen

latest detected scan date

Vulnerability instance Last seen



Vulnerability instance score



Vulnerability instance location path



Unique Vulnerability uniqueness criteria



Vulnerability title

SQL Injection


Vulnerability score


available vulnerability-specific data

Vulnerability details

Result Status, Result State

Vulnerability status

To Verify



Result State

Vulnerability instance connection- additional information


Fixed title

Fix - Title


Fix - Description

Vulnerability status mapping

Checmarx CxSAST Status

Vulcan Status

(other statuses)





Ignored - false positive

Not Exploitable

Ignored risk acknowledged

Vulnerability score mapping

Checmarx CxSAST score

Vulcan score







Status Update Mechanisms

Every day, the Vulcan Platform syncs with the vendor's platform to receive updates on existing vulnerabilities and assets and to retrieve new ones (if any added).

The table below lists how the status update mechanism works in the Checmarx CxSAST connector for the vulnerabilities and assets in the Vulcan Platform.

Update type in Vulcan

Mechanism (When?)

The asset is archived

- Asset not found on the connector's last sync

- Asset not seen for X days according to "Last Seen".

The vulnerability instance status changes to "Fixed"

- If the vulnerability no longer appears in the scan findings.

Note: Asset or vulnerability updates on the vendor side are reflected on the Vulcan Platform only on the next scheduled connector sync (the next day).

API Endpoints in Use

API version: x.x.x


Use in Vulcan

Permissions required







/cxrestapi/sast/scans?last=1&projectId={{ project_id }}

Last Scans



Create Reports


reports/sastScan/{{ report_id }}/status

Report Status


/reports/sastScan/{{ report_id }}

Report Results


/auth/teams/{{ team_id }}



Data Validation

Matching Data between Checkmarx CxSAST and Vulcan

Matching Assets

In Checkmarx:

  1. Click on the relevant section or page where assets are displayed.

  2. The number of assets displayed in Checkmarx should match the number of assets displayed in Vulcan under the "Assets" tab.

    In Vulcan:

Matching Vulnerability Instances

In Checkmarx:

  1. Click on a specific asset to view its details.

  2. Navigate to the "Full Scan Results" section.

  3. Click on the latest completed scan (scan history).

  4. Click on the magnifying glass icon to view vulnerability details for that scan.

  5. Count the incidents or vulnerabilities listed on this page.

In Vulcan:

  1. Go to the "Vulnerabilities" section.

  2. Compare the number of vulnerability instances (incidents) in Vulcan with the count obtained from Checkmarx.

    The incidents count in Vulcan should match the vulnerability instances count in the vendor's platform.

Did this answer your question?