Skip to content
Checkmarx DAST

Checkmarx DAST

Category: DAST
License: Commercial
Suphi Cankurt
Suphi Cankurt
AppSec Enthusiast
Updated April 9, 2026
7 min read
Key Takeaways
  • Built on ZAP's open-source engine with enterprise additions — headless Chrome AJAX Spider for JavaScript SPAs, DAST Tunneling for internal apps, and compliance reporting.
  • Part of Checkmarx One platform with cross-scanner correlation: DAST findings are deduplicated against SAST, SCA, and IAST results through ASPM for prioritized remediation.
  • DAST Tunneling enables scanning of internal, firewalled, and staging applications from the cloud without opening inbound ports — end-to-end encrypted connection.
  • API scanning covers REST, SOAP, GraphQL, and gRPC via OpenAPI spec import or Postman Collection upload. Automatic shadow API discovery included.
  • Authentication wizard supports browser-recorded login flows, TOTP/2FA, SSO (SAML, OAuth, OIDC), and MFA with push notifications.

Checkmarx DAST is the dynamic application security testing engine inside Checkmarx One. It scans running web applications and APIs using an engine built on ZAP, the most widely used open-source DAST tool.

In September 2024, ZAP’s core team — Simon Bennetts (ZAP’s creator), Rick Mitchell, and Ricardo Pereira — joined Checkmarx as employees. ZAP itself stays free and open-source under Apache v2.

Checkmarx DAST wraps the same engine with enterprise features: managed cloud infrastructure, SSO/MFA authentication, tunneling for internal apps, and cross-scanner correlation through ASPM.

Checkmarx DAST product page showing Dynamic Application Security Testing within Checkmarx One platform

What is Checkmarx DAST?

Checkmarx DAST is a commercial dynamic application security testing tool that scans running web applications and APIs for security vulnerabilities. It is built on ZAP’s open-source scanning engine and sold as part of the Checkmarx One unified application security platform.

The scanner performs black-box testing — it crawls your web app, discovers pages and APIs, then attacks them with active and passive scan rules covering the OWASP Top 10 and beyond.

If you’re already on Checkmarx One, the real draw here is correlation. DAST findings get merged with SAST, SCA, and IAST results through the ASPM layer.

So when the same SQL injection shows up in source code (SAST) and is confirmed exploitable at runtime (DAST), it becomes one issue — not duplicate tickets across separate dashboards.

ZAP-Powered Engine
Built on ZAP’s scanning core — the most widely used open-source DAST engine. Active scanning, passive analysis, and headless Chrome AJAX Spider for JavaScript SPAs.
Cross-Scanner Correlation
ASPM correlates DAST findings with SAST, SCA, and IAST results. One vulnerability found by multiple scanners becomes one ticket, not four. Deduplicated and prioritized by application context.
DAST Tunneling
Scan internal, firewalled, and staging applications from the Checkmarx cloud. End-to-end encrypted tunnel — no inbound firewall rules, no VPN setup required.

Checkmarx DAST scan overview showing vulnerability distribution by risk level and compliance posture charts

Key features

FeatureDetails
Scanning engineZAP-based (active + passive scan rules)
Web crawlingStandard spider + AJAX Spider (headless Chrome)
SPA supportReact, Angular, Vue via browser-based crawling
API testingREST, SOAP, GraphQL, gRPC
API importOpenAPI/Swagger specs, Postman Collections
Shadow API discoveryAutomatic detection of undocumented endpoints
AuthenticationBrowser recording, TOTP/2FA, SSO (SAML/OAuth/OIDC), MFA
Internal scanningDAST Tunneling (encrypted, no inbound ports)
Cloud scan limit2 hours 45 minutes (no limit via Docker/CLI)
DeploymentCloud (SaaS), Docker, Kubernetes, CI/CD CLI
PlatformPart of Checkmarx One (Professional and Enterprise tiers)
CompliancePCI DSS, OWASP mapping with PDF/JSON reports

How does Checkmarx DAST scan web applications?

Two crawling modes. The standard spider follows links and submits forms to map the application.

For JavaScript-heavy SPAs built with React, Angular, or Vue, the AJAX Spider launches headless Chrome. It renders dynamic content, follows client-side routes, triggers AJAX requests, and finds pages that traditional crawlers miss entirely.

Once crawling finishes, active scanning attacks discovered endpoints with injection payloads. This covers SQL injection, XSS, out-of-band flaws, server misconfigurations, broken access controls, insecure JWT handling, and authentication weaknesses.

Checkmarx DAST results table listing vulnerability types with severity, instances, compliance mapping, and status columns

What APIs can Checkmarx DAST test?

Checkmarx DAST scans REST, SOAP, GraphQL, and gRPC endpoints. Import an OpenAPI/Swagger spec or Postman Collection to define your API surface, or let the scanner discover endpoints on its own during crawling.

Shadow API discovery is worth calling out — it catches undocumented endpoints that aren’t in your spec. These get cataloged in the Checkmarx One dashboard alongside API discoveries from SAST scans.

How does DAST Tunneling work?

DAST Tunneling lets you scan applications that aren’t publicly accessible. It creates an encrypted connection between the Checkmarx cloud and your internal network.

Staging environments, pre-production apps, anything behind a corporate firewall — all covered.

No inbound firewall rules needed. The agent initiates an outbound connection, and scans run through that tunnel. Simpler than a VPN.

Cloud vs. Docker scan limits
Cloud-hosted DAST scans have a 2 hour 45 minute time limit. For larger applications, run scans via the Docker image (docker pull checkmarx/dast:latest) or the DAST CLI in your pipeline — both have no timeout limit.

How does Checkmarx DAST handle authentication?

Authenticated scanning works through several methods. The ZAP by Checkmarx browser extension (Chrome and Firefox) can record your login flow for replay during scans.

Enterprise SSO is covered: SAML, OAuth 2.0, and OpenID Connect. TOTP and MFA with push notifications are also supported.

Before kicking off a full scan, you can run a pre-scan verification to confirm authentication actually works. An Environment Setup Wizard walks through the configuration if your team hasn’t set up DAST auth before.

How does cross-scanner correlation work?

This is where Checkmarx DAST differs most from standalone tools. After the scan, Checkmarx One’s ASPM layer matches DAST findings against results from SAST, SCA, IAST, and other scanners.

Say SAST flags a SQL injection in source code, DAST confirms it’s exploitable at runtime, and SCA finds a related vulnerable dependency. Instead of three tickets across three dashboards, you get one.

Cross-scanner correlation flow: SAST flags SQL injection in source, DAST confirms exploitable at runtime, SCA finds vulnerable dependency, ASPM merges into 1 prioritized ticket

Prioritization is context-aware too. A critical vulnerability in a payment service ranks higher than the same issue in an internal admin tool.

Checkmarx DAST risk detail view showing vulnerability name, risk level, confidence, method, URI, evidence, and attack information

Compliance reporting

The DAST results viewer includes a compliance column that maps each finding to relevant standards. You can filter by framework and export reports in PDF or JSON.

PCI DSS and OWASP Top 10 are currently supported.

CI/CD integration

GitHub Actions

Checkmarx provides an official GitHub Action (Checkmarx/dast-github-action) for running DAST scans directly in your CI/CD pipeline. Check the action’s README for current input parameters and configuration options.

Docker

For pipelines without native Checkmarx integration, run DAST scans via the official Docker image (checkmarx/dast). Docker-based scans have no timeout limit, making them suitable for large applications that exceed the cloud platform’s 2 hour 45 minute limit.

See the Checkmarx DAST CLI documentation for setup instructions.

Integrations

Checkmarx One Platform
Checkmarx SAST Checkmarx SAST
Checkmarx SCA Checkmarx SCA
Checkmarx IAST Checkmarx IAST
ASPM ASPM
CI/CD
GitHub Actions GitHub Actions
Jenkins Jenkins
Azure DevOps Azure DevOps
TeamCity TeamCity
CircleCI CircleCI
GitLab CI GitLab CI
Bamboo Bamboo
AWS CodeBuild AWS CodeBuild
Source Code Management
GitHub GitHub
GitLab GitLab
Bitbucket Bitbucket
Azure DevOps Azure DevOps
Ticketing
Jira Jira
GitHub Issues GitHub Issues
Azure Boards Azure Boards

Getting started

1
Get Checkmarx One access — Checkmarx DAST is part of the Checkmarx One platform (Professional or Enterprise tier). Contact sales through checkmarx.com for a demo.
2
Configure your target — Use the Environment Setup Wizard to set your target URL, authentication method, and scan scope. For internal apps, set up DAST Tunneling.
3
Choose scan type — Select “web” for web application scanning or “api” for API testing. Import your OpenAPI spec or Postman Collection if scanning APIs.
4
Run the scan — Launch from the Checkmarx One UI, via CI/CD pipeline (GitHub Action, Docker, CLI), or schedule recurring scans.
5
Review in ASPM — Findings appear in the Checkmarx One dashboard alongside SAST, SCA, and IAST results. Use ASPM to see correlated and prioritized vulnerabilities across all scanners.

Checkmarx DAST vs ZAP

Since Checkmarx DAST is built on ZAP’s engine, this is the most common comparison. Both use the same scanning core, but they target different users.

Checkmarx DASTZAP by Checkmarx
PriceCommercial (part of Checkmarx One)Free, open-source (Apache v2)
Target userEnterprise security teamsDevelopers, pentesters
PlatformIntegrated into Checkmarx OneStandalone tool
Cross-scanner correlationYes (ASPM with SAST, SCA, IAST)No
Internal app scanningDAST Tunneling (cloud-to-internal)Manual setup required
Authentication wizardGUI with SSO/MFA/TOTP supportManual configuration
Compliance reportingPCI DSS, OWASP mapping, PDF/JSON exportCommunity add-ons
Cloud hostingManaged SaaSSelf-hosted only
Docker imagecheckmarx/dast (no timeout)ghcr.io/zaproxy/zaproxy

If you need a free scanner or prefer full control, ZAP gives you the same engine at no cost. If you’re already paying for Checkmarx One and want DAST findings correlated with your SAST and SCA results, Checkmarx DAST is the more practical choice.

When to use Checkmarx DAST

Checkmarx DAST makes the most sense if you’re already on Checkmarx One or planning to adopt it. The cross-scanner correlation is the real selling point.

Consolidating DAST with SAST, SCA, and IAST findings in one prioritized view cuts down on duplicate tickets and triage time.

Best for
Teams already on Checkmarx One who want correlated DAST findings alongside SAST, SCA, and IAST — not a standalone DAST tool.

Good fit for:

  • Organizations already using Checkmarx One for SAST or SCA
  • Teams scanning internal/staging apps behind firewalls (DAST Tunneling)
  • Enterprises needing compliance reporting mapped to PCI DSS and OWASP
  • Teams testing JavaScript SPAs and modern APIs (REST, GraphQL, gRPC)
  • Security programs wanting one dashboard for all application security testing types

Not the best fit if:

  • You want a standalone DAST tool — Invicti or Acunetix are purpose-built
  • Budget is a concern — ZAP is free and uses the same underlying engine
  • You need manual penetration testing workflows — Burp Suite is the industry standard
  • You have a handful of apps and don’t need platform-level correlation

Browse DAST tools to compare options, or see how Checkmarx DAST compares to ZAP and other scanners in the category.

Note: ZAP's core team (Simon Bennetts, Rick Mitchell, Ricardo Pereira) joined Checkmarx in September 2024. ZAP remains free and open-source under Apache v2.

Frequently Asked Questions

What is Checkmarx DAST?
Checkmarx DAST is the dynamic application security testing component of the Checkmarx One platform. Built on ZAP’s open-source scanning engine, it adds enterprise features: authentication wizard with SSO/MFA support, DAST Tunneling for internal apps, compliance reporting, and cross-scanner correlation through ASPM.
Is Checkmarx DAST free?
No. Checkmarx DAST is a commercial product sold as part of Checkmarx One. It is included in the Professional and Enterprise tiers, and available as a paid add-on in the Essentials tier. ZAP by Checkmarx is the free, open-source alternative.
What is the difference between Checkmarx DAST and ZAP?
Both use the same ZAP scanning engine. ZAP by Checkmarx is free and open-source under Apache v2 — it is a standalone tool for developers. Checkmarx DAST adds enterprise features: authentication wizard with SSO/MFA support, DAST Tunneling for internal apps, ASPM correlation across SAST/SCA/IAST, compliance reporting, and managed cloud infrastructure.
How does Checkmarx DAST handle JavaScript SPAs?
Checkmarx DAST includes an AJAX Spider that uses headless Chrome to crawl JavaScript-heavy single page applications. It renders dynamic content, follows client-side routes, handles AJAX requests, and discovers DOM-based vulnerabilities that traditional crawlers miss.
Can Checkmarx DAST scan internal applications?
Yes. DAST Tunneling creates an end-to-end encrypted connection between the Checkmarx cloud and your internal network. This lets you scan applications behind firewalls, in staging environments, or on private networks without opening inbound ports.
What APIs does Checkmarx DAST test?
Checkmarx DAST tests REST, SOAP, GraphQL, and gRPC endpoints. You can import OpenAPI/Swagger specifications or Postman Collections to define API targets. The scanner also performs automatic shadow API discovery to find undocumented endpoints.