Skip to content
Checkmarx SCA

Checkmarx SCA

Category: SCA
License: Commercial (with Free Trial)
Suphi Cankurt
Suphi Cankurt
+7 Years in AppSec
Updated April 24, 2026
8 min read
Key Takeaways
  • Three-pronged supply chain detection: evaluates maintainer credibility, assesses maintenance health patterns, and performs behavioral analysis — has identified 420,000+ malicious packages.
  • Exploitable path analysis traces all potential call paths to determine if vulnerable code is actually reachable, with zero false positives reported in industry testing.
  • Part of the Checkmarx One platform used by 40% of the Fortune 100; SCA findings correlate with SAST, DAST, and API security results.
  • Scans transitive dependencies to unlimited depth including private JFrog Artifactory registries; generates SBOMs in CycloneDX format with CVSS 4.0 scoring.

Checkmarx SCA is an enterprise SCA tool that goes beyond CVE matching by using behavioral analysis to detect malicious packages and supply chain attacks. Part of the Checkmarx One platform, it has identified more than 420,000 malicious packages through a three-pronged approach: evaluating package provider credibility, assessing maintenance patterns, and analyzing package behavior.

Checkmarx SCA remediation dashboard showing vulnerability findings and fix recommendations

The tool integrates with Checkmarx’s SAST, DAST, and API security products, letting teams correlate SCA findings with other vulnerability types for unified prioritization. Checkmarx One is used by 40% of the Fortune 100.

What is Checkmarx SCA?

Checkmarx SCA evaluates dependencies from three angles — this is a heavier software composition analysis model than a classic manifest-only CVE scan. First, it checks maintainer credibility: contributor history, publishing patterns, and association with known malicious actors.

Second, it assesses maintenance health: release frequency, issue response times, and community engagement.

Third, it performs behavioral analysis: detecting packages that access sensitive system resources, establish suspicious network connections, or exhibit dependency confusion patterns.

Supply Chain Detection
Evaluates maintainer credibility, publishing patterns, and behavioral signals to catch malicious packages. Has identified 420K+ malicious packages including typosquatting and dependency confusion.
Exploitable Path Analysis
Traces all potential call paths to determine if vulnerable code is actually reachable. Filters findings so teams fix what matters rather than chasing theoretical risks.
Checkmarx One Integration
SCA findings correlate with SAST, DAST, and API security results in a single dashboard. Consistent policies and unified prioritization across all scan types.

Key features

FeatureDetails
Malicious package detection420,000+ identified packages; behavioral, credibility, and maintenance analysis
AccuracyZero false positives in industry testing (vs. 10% competitor FP rate)
Transitive dependency scanningUnlimited depth; covers direct and indirect references
Exploitable path analysisMaps all potential call paths to vulnerable code
License compliancePolicy-based enforcement with automated actions
SBOM generationIndustry-standard CycloneDX format
CVSS supportUp to CVSS 4.0 severity scoring
Container scanningDocker and OCI image analysis
Private registriesJFrog Artifactory integration for private packages

Supply chain risk analysis

Checkmarx SCA evaluates the trustworthiness of package maintainers and repositories. Packages from suspicious sources receive higher risk scores regardless of known vulnerabilities.

The analysis catches zero-day supply chain attacks before CVEs are published.

Checkmarx SCA accuracy testing showing zero false positives in vulnerability detection

Behavioral analysis

The engine analyzes what packages actually do: accessing sensitive system resources, establishing network connections, or exhibiting patterns associated with dependency confusion. This catches malicious code that CVE databases have not cataloged yet.

Zero False Positives
Checkmarx reports zero false positives in industry testing, compared to a 10% false positive rate from competitors. The exploitable path analysis traces all potential call paths to vulnerable OSS code to determine if it could actually execute in your application.

Transitive dependency scanning

The tool scans transitive dependencies to unlimited depth. It covers both direct and indirect package references, including packages pulled from private JFrog Artifactory registries.

Checkmarx SCA transitive dependency scanning showing deep dependency tree analysis

License compliance

Define acceptable licenses for your organization, get alerts when dependencies introduce problematic terms, and generate compliance reports. Policy rules support automated actions including alerts, PR blocking, and build breaks.

Checkmarx SCA license risk management showing compliance tracking and policy enforcement

SBOM generation

Generates Software Bills of Materials in CycloneDX format. SBOMs include full dependency trees with vulnerability status and license information.

Checkmarx SCA SBOM generation showing software bill of materials output

Container scanning

Analyzes container images for vulnerable base layers and installed packages. Examines Dockerfiles, identifies the base image supply chain, and maps vulnerabilities across all image layers.

Reachability analysis

Checkmarx SCA’s exploitable-path feature is a form of reachability analysis. It pairs the manifest scan with SAST-style code scanning to check whether a vulnerable package’s vulnerable method is actually reachable from the application’s own code, and then walks the static call graph to show the exact path. Reachability coverage is currently available for Python, Java, JavaScript, and C#.

Dependency update automation

Checkmarx SCA does not ship automated dependency-update pull requests in the Dependabot or Renovate pattern. Remediation in Checkmarx SCA is policy-driven: configurable policies can block PRs that introduce new critical vulnerabilities, and the dashboard surfaces suggested fix versions for developers to apply manually. Teams that want auto-merging update PRs typically layer Dependabot or Renovate on top of Checkmarx SCA rather than replacing them.

Integrations

CI/CD & DevOps
GitHub Actions GitHub Actions
GitLab CI GitLab CI
Azure DevOps Azure DevOps
Jenkins Jenkins
IDEs
VS Code VS Code
IntelliJ IDEA IntelliJ IDEA
Visual Studio Visual Studio
Eclipse Eclipse
Registries & Tools
JFrog Artifactory JFrog Artifactory
Docker Desktop Docker Desktop

Getting started

1
Install the CLI — Download the Checkmarx CLI (cx) from the Checkmarx One portal. Available for Linux, macOS, and Windows.
2
Configure authentication — Run cx configure and enter your Checkmarx One tenant, API key, and base URL.
3
Run an SCA scan — Execute cx scan create --project-name my-project --source . --scan-types sca.
4
Review results — View findings in the Checkmarx One dashboard or export as JSON with cx results show. Focus on exploitable path findings first.
Checkmarx SCA policy rules with automated actions for vulnerability and license management

When to use Checkmarx SCA

Checkmarx SCA fits organizations that need supply chain attack detection beyond standard CVE matching, especially those already using or considering Checkmarx One for SAST.

The behavioral analysis and malicious package database (420K+ packages) provide detection that CVE-only scanners miss. Exploitable path analysis cuts through alert noise by showing which vulnerabilities have reachable code paths.

It is a commercial product with no permanent free tier. Median annual Checkmarx platform contract: $54,000 (range: $25,000–$111,000). Organizations only needing basic CVE scanning may find lighter-weight tools sufficient.

On false-positive rate, Checkmarx SCA’s accuracy characteristics follow the broader Checkmarx One exploit-path correlator: the more of the suite that is cross-correlated (SAST, SCA, API), the higher the prioritization signal and the lower the effective false-positive rate in the triage queue. Standalone SCA without exploit-path correlation behaves more like a classic CVE scanner. Note that “Checkmarx SCS” (Supply Chain Security) is a distinct extension module in the Checkmarx One platform focused on package-level supply-chain threats — it layers on top of Checkmarx SCA rather than replacing it.

Best for
Teams that need supply chain attack detection alongside traditional vulnerability scanning, especially those using Checkmarx One for unified AppSec across SAST, SCA, DAST, and API security.

How it compares:

vs.Key difference
Snyk Open SourceSnyk has a broader developer ecosystem and free tier. Checkmarx SCA has deeper behavioral analysis for supply chain attacks and correlates with Checkmarx SAST.
SocketSocket focuses on behavioral analysis for npm/PyPI. Checkmarx SCA covers more ecosystems and integrates with a full AppSec platform.
Veracode SCABoth offer supply chain detection (Veracode via Phylum acquisition). Checkmarx SCA ties into the broader Checkmarx One platform; Veracode ties into the Veracode suite.

Learn more about what SCA tools do and how to integrate SCA into CI/CD pipelines.

Checkmarx SCA pricing

Checkmarx does not publish public dollar pricing for Checkmarx SCA or the broader Checkmarx One platform. All paid quotes are routed through sales via the checkmarx.com/contact form.

The commercial shape is an annual enterprise subscription inside the Checkmarx One bundle. Checkmarx SCA is licensed as one scanner in that bundle alongside SAST, Secrets, IaC, API security, and Supply Chain Security, with pricing scaled by the number of active committers or applications on the platform. There is no permanent self-serve free tier — developers can run SCA scans at no cost through the Checkmarx IDE plugins for IntelliJ IDEA Ultimate and VS Code, but platform access requires a paid tenant.

For budgeting context, our broader Checkmarx contract page lists a median annual platform deal of roughly $54,000 with a range of $25,000 to $111,000 (source: Vendr), but those figures cover the full Checkmarx One platform rather than SCA alone and vary substantially with committer count and module mix.

Re-check directly with Checkmarx before budgeting — enterprise platform pricing changes between renewals.

Checkmarx SCA alternatives

Checkmarx SCA is usually compared against other enterprise SCA tools rather than developer-first OSS scanners. The closest alternatives each shift the tradeoff differently.

Snyk Open Source

Snyk Open Source is the developer-first SCA with the broadest free tier and the most mature automated fix-PR workflow. Snyk wins when developers are the primary audience and speed of onboarding matters; Checkmarx SCA wins when exploit-path correlation across SAST, SCA, and API findings is the requirement.

Black Duck

Black Duck leads on enterprise license compliance and binary analysis. Black Duck fits legal-heavy and regulated industries where license-conflict detection is the core requirement; Checkmarx SCA fits organizations where correlation with SAST and API security sits above pure license depth.

Mend SCA

Mend SCA ships SCA with Renovate-powered automated dependency updates. Mend is the right pick when continuous update automation is the primary workflow; Checkmarx SCA doesn’t replicate that auto-PR model and instead focuses on policy-driven triage.

Sonatype Lifecycle

Sonatype Lifecycle centers on artifact-repository enforcement (Nexus Repository). Sonatype is the right pick when the control point is the artifact pipeline and the policy engine must gate binaries at pull-through; Checkmarx SCA operates at the source-and-manifest layer instead.

For the broader landscape, see SCA tools overview and what SCA does.

Checkmarx SCA FAQ

What is the difference between Checkmarx SAST and Checkmarx SCA?

Checkmarx SAST (formerly CxSAST) scans your own first-party code for vulnerability patterns. Checkmarx SCA scans your open-source dependencies — direct and transitive — for known CVEs, malicious packages, and license issues. They are separate scanners inside the same Checkmarx One platform, and the exploit-path correlator links findings from both.

How does Checkmarx SCA detect exploitable vulnerabilities?

It pairs the manifest scan with SAST-style code scanning to determine whether your application actually calls the vulnerable method in the vulnerable package, then walks the static call graph to show the exact path. Current exploit-path coverage is Python, Java, JavaScript, and C#.

Is Checkmarx SCA included in Checkmarx One?

Yes. Checkmarx SCA is one of the scanners bundled inside the Checkmarx One platform alongside SAST, Secrets, IaC, API security, and Supply Chain Security. It can be licensed standalone, but the exploit-path correlation that drives the zero-false-positive claim requires the other scanners to be live on the same project.

Does Checkmarx SCA generate SBOMs?

Yes, in CycloneDX format. SBOMs include the full transitive dependency tree with vulnerability status, CVSS severity (up to CVSS 4.0), and license information.

How does the SCA Resolver work with the SCA Scanner?

The SCA Resolver is a local CLI that parses manifests and lockfiles to resolve the true dependency graph in your environment, then uploads the resolved list to the Checkmarx SCA cloud scanner for CVE matching and exploit-path analysis. This is the recommended flow for monorepos and private-registry setups where the cloud scanner cannot reach the packages directly.

Does Checkmarx SCA produce license-compliance reports?

Yes. License policies are defined in the Checkmarx One dashboard and can trigger alerts, block PRs, or break builds when a dependency introduces a license that violates policy. Attribution exports and compliance summaries are available from the same policy module.

Frequently Asked Questions

What is Checkmarx SCA?
Checkmarx SCA is an enterprise SCA tool that combines vulnerability scanning with behavioral analysis to detect malicious packages and supply chain attacks. It is part of the Checkmarx One platform alongside SAST, DAST, and API security. The tool has identified more than 420,000 malicious packages.
How does Checkmarx SCA detect supply chain attacks?
Checkmarx SCA uses a three-pronged approach: evaluating package provider credibility, assessing maintenance patterns, and performing behavioral analysis to detect malicious intent. It has identified 420K+ malicious packages including typosquatting and dependency confusion.
Does Checkmarx SCA work standalone?
Checkmarx SCA can be used independently, but it works best as part of Checkmarx One where SCA findings correlate with SAST, DAST, and API security results for unified prioritization.
Is there a free version of Checkmarx SCA?
Checkmarx offers a free trial of Checkmarx One including SCA. There is no permanent free tier. For free SCA alternatives, consider Grype, OWASP Dependency-Check, or Trivy.
How accurate is Checkmarx SCA?
Checkmarx reports zero false positives in industry testing, compared to 10% false positive rates from competitors. Exploitable path analysis filters findings to vulnerabilities with reachable code paths.

* Pricing data from Vendr — anonymized contract values from real buyer transactions.