Checkmarx integration
Focus Checkmarx SAST and SCA alerts on code paths with demonstrated exploit potential.
Integration details
Primary category
Software Composition Analysis
Sync direction
Checkmarx ↔ Konvu
Findings are ingested from Checkmarx into Konvu. Based on your workflow, Konvu can then push context, status changes, and severity updates back to Checkmarx.
Status
Available
What is Checkmarx?
Checkmarx is an enterprise application security platform offering SAST (CxSAST) and SCA (CxSCA) to detect vulnerabilities in proprietary code and open source dependencies.
Why connect Checkmarx to Konvu
- Triage Checkmarx's data flow analysis results by confirming which paths are exploitable in deployed code.
- Reduce Checkmarx scan alert volume by filtering to findings with evidence of real-world risk.
- Sync triage decisions back to Checkmarx projects to align security gates with actual threat exposure.
How it works
Scan
Checkmarx produces findings from scans or assessments.
Ingest & enrich
Konvu ingests those findings and enriches them with code, configuration, and deployment context.
Assess exploitability
Konvu determines exploitability and recommended action with evidence attached.
Sync decisions
Based on your workflow, Konvu can push context, status updates, and severity adjustments back into Checkmarx.
Quick setup
Configure Checkmarx from the integrations list in Konvu.
- 1Go to /configuration/integrations in Konvu and choose Checkmarx.
- 2Authorize access and confirm the data sources you want to sync.
- 3Save the configuration to start syncing.
Sync direction
Checkmarx ↔ Konvu
Findings are ingested from Checkmarx into Konvu. Based on your workflow, Konvu can then push context, status changes, and severity updates back to Checkmarx.
How Checkmarx compares
More integrations
View allGitHub
Prioritize GitHub CodeQL and Dependabot alerts by adding exploit context to each finding.
GitLab
Add exploitability analysis to GitLab's built-in SAST and SCA pipeline findings.
Semgrep
Triage Semgrep's rule-based code findings and supply chain alerts with exploit evidence.
Snyk
Triage Snyk vulnerabilities across code, dependencies, and containers with exploit context.

Veracode
Prioritize Veracode policy violations by identifying which findings are exploitable.

Black Duck
Add exploit evidence to Black Duck's component risk and license compliance findings.