Checkmarx SCA is an enterprise SCA tool that goes beyond CVE matching by using behavioral analysis to detect malicious packages and supply chain attacks. Part of the Checkmarx One platform, it has identified more than 420,000 malicious packages through a three-pronged approach: evaluating package provider credibility, assessing maintenance patterns, and analyzing package behavior.

The tool integrates with Checkmarx’s SAST, DAST, and API security products, letting teams correlate SCA findings with other vulnerability types for unified prioritization. Checkmarx has held a Gartner Magic Quadrant Leader position for AST for seven consecutive years.
What is Checkmarx SCA?
Checkmarx SCA evaluates dependencies from three angles. First, it checks maintainer credibility: contributor history, publishing patterns, and association with known malicious actors. Second, it assesses maintenance health: release frequency, issue response times, and community engagement. Third, it performs behavioral analysis: detecting packages that access sensitive system resources, establish suspicious network connections, or exhibit dependency confusion patterns.
Key features
| Feature | Details |
|---|---|
| Malicious package detection | 420,000+ identified packages; behavioral, credibility, and maintenance analysis |
| Accuracy | Zero false positives in industry testing (vs. 10% competitor FP rate) |
| Transitive dependency scanning | Unlimited depth; covers direct and indirect references |
| Exploitable path analysis | Maps all potential call paths to vulnerable code |
| License compliance | Policy-based enforcement with automated actions |
| SBOM generation | Industry-standard CycloneDX format |
| CVSS support | Up to CVSS 4.0 severity scoring |
| Container scanning | Docker and OCI image analysis |
| Private registries | JFrog Artifactory integration for private packages |
Supply chain risk analysis
Checkmarx SCA evaluates the trustworthiness of package maintainers and repositories. Packages from suspicious sources receive higher risk scores regardless of known vulnerabilities. The analysis catches zero-day supply chain attacks before CVEs are published.

Behavioral analysis
The engine analyzes what packages actually do: accessing sensitive system resources, establishing network connections, or exhibiting patterns associated with dependency confusion. This catches malicious code that CVE databases have not cataloged yet.
Transitive dependency scanning
The tool scans transitive dependencies to unlimited depth. It covers both direct and indirect package references, including packages pulled from private JFrog Artifactory registries.

License compliance
Define acceptable licenses for your organization, get alerts when dependencies introduce problematic terms, and generate compliance reports. Policy rules support automated actions including alerts, PR blocking, and build breaks.

SBOM generation
Generates Software Bills of Materials in CycloneDX format. SBOMs include full dependency trees with vulnerability status and license information.

Container scanning
Analyzes container images for vulnerable base layers and installed packages. Examines Dockerfiles, identifies the base image supply chain, and maps vulnerabilities across all image layers.
Integrations
Getting started
cx) from the Checkmarx One portal. Available for Linux, macOS, and Windows.cx configure and enter your Checkmarx One tenant, API key, and base URL.cx scan create --project-name my-project --source . --scan-types sca.cx results show. Focus on exploitable path findings first.
When to use Checkmarx SCA
Checkmarx SCA fits organizations that need supply chain attack detection beyond standard CVE matching, especially those already using or considering Checkmarx One for SAST.
The behavioral analysis and malicious package database (420K+ packages) provide detection that CVE-only scanners miss. Exploitable path analysis cuts through alert noise by showing which vulnerabilities have reachable code paths.
It is a commercial product with no permanent free tier. Organizations only needing basic CVE scanning may find lighter-weight tools sufficient.
How it compares:
| vs. | Key difference |
|---|---|
| Snyk Open Source | Snyk has a broader developer ecosystem and free tier. Checkmarx SCA has deeper behavioral analysis for supply chain attacks and correlates with Checkmarx SAST. |
| Socket | Socket focuses on behavioral analysis for npm/PyPI. Checkmarx SCA covers more ecosystems and integrates with a full AppSec platform. |
| Veracode SCA | Both offer supply chain detection (Veracode via Phylum acquisition). Checkmarx SCA ties into the broader Checkmarx One platform; Veracode ties into the Veracode suite. |
Learn more about what SCA tools do and how to integrate SCA into CI/CD pipelines.
