Shadow and zombie API discovery
Reconciles runtime traffic against OpenAPI, GraphQL, and gRPC schemas to surface endpoints that exist in production but not in documentation, and endpoints documented but no longer running. Pure DAST cannot do this.
Checkmarx • Application security
Checkmarx API Security discovers shadow and zombie APIs, detects drift between documented and actual API surfaces, runs runtime risk scoring per endpoint, and covers REST, GraphQL, gRPC, and SOAP inside the same Checkmarx One backlog as SAST, SCA, and DAST.
A Merito Checkmarx API Security engagement reconciles OpenAPI documentation with the runtime surface, configures shadow-API discovery, and routes findings into the unified Checkmarx One backlog so AppSec sees one queue instead of stitching together API governance separately.
What it is
Checkmarx API Security is the API-specific scanner inside the Checkmarx One Code pillar. Where DAST exercises the application end-to-end, API Security focuses on the API contract: the endpoints exposed, the auth model on each, the schema validation, the rate limits, and the runtime drift between what the OpenAPI document says and what the runtime actually serves. Programs running pure DAST against the web frontend are missing the structural risk; the API surface is usually the actual application.
Shadow API discovery is the load-bearing capability. In real environments, the API surface drifts: developers ship endpoints, deprecate them informally, fork an internal version, or expose a debugging route that becomes load-bearing. Checkmarx API Security crawls the runtime, reconciles against the OpenAPI or GraphQL schema in source control, and surfaces the delta. Endpoints that exist in production but are missing from documentation are shadow APIs; endpoints in documentation that no longer exist are zombie APIs. Both create risk that pure SAST and DAST never catch.
Runtime risk scoring per endpoint is the prioritization signal. Not every API endpoint carries the same risk: a public unauthenticated read endpoint is low-risk; an internal write endpoint with authorization-only access to a financial record is high-risk. Checkmarx scores per endpoint based on auth shape, data sensitivity, traffic patterns, and historical findings. The AppSec team triages high-risk endpoints first instead of treating an OpenAPI document as a flat list.
What disrupts API Security adoption is incomplete schema. The product reconciles against documented OpenAPI, GraphQL, or gRPC contracts, and programs without authoritative schemas in source control end up with the scanner inferring everything from runtime traffic alone. That works but loses the drift-detection advantage. Merito's engagement starts with schema discipline: are the OpenAPI specs authoritative, are they current, and are they checked into the same repo as the implementation. Without that, API Security degrades to runtime scanning, which is still useful but not the full product.
Ideal use cases
What it is best at
Reconciles runtime traffic against OpenAPI, GraphQL, and gRPC schemas to surface endpoints that exist in production but not in documentation, and endpoints documented but no longer running. Pure DAST cannot do this.
Scores each endpoint by auth shape, data sensitivity, traffic patterns, and historical findings so the AppSec team triages high-risk endpoints first.
One engine across the API protocols enterprises actually run. Programs stop stitching together specialist tools per protocol.
API findings link back to the SAST flow path that exposed the endpoint, the SCA dependency at the runtime layer, and the DAST runtime confirmation. AppSec sees the full chain in one ticket.
Ingests OpenAPI 3.x, GraphQL schema, and gRPC proto files directly. Programs running schema-first development get drift detection as a default rather than an upsell.
Core capabilities
Knowing what API surface actually exists at runtime versus what documentation claims.
Runtime API discovery
Crawls runtime traffic and infers the live endpoint surface, including endpoints not present in any OpenAPI document.
Shadow API detection
Surfaces endpoints exposed at runtime but missing from documentation. Common in fast-moving services where ops drift past governance.
Zombie API detection
Surfaces documented endpoints that no longer exist or have been silently deprecated. Cleans up consumers calling dead routes.
API inventory
Single inventory of every API endpoint across the portfolio with auth shape, data sensitivity tags, and risk score.
Reconciling runtime against documentation continuously so drift is caught quickly.
OpenAPI and GraphQL drift detection
Compares runtime API surface against OpenAPI 3.x, GraphQL schema, or gRPC proto files in source control. Surfaces drift as it appears.
Schema validation
Validates that documented schemas match the runtime payloads. Catches breaking changes and drift between contract and implementation.
Auth-model verification
Verifies that the auth model documented in OpenAPI matches what is actually enforced at runtime. Surfaces missing auth on endpoints that should require it.
Prioritizing the API surface so triage focuses on what actually matters.
Per-endpoint risk scoring
Scores each endpoint by auth shape, data sensitivity, traffic patterns, and historical findings.
Cross-product correlation
API findings cross-link to SAST flow paths, SCA dependencies, and DAST runtime confirmations inside Checkmarx One.
Triage and Remediation clustering
Related API findings cluster with SAST and SCA findings on root cause for single-fix remediation.
Compliance reporting
Audit-ready evidence for PCI DSS, HIPAA, SOC 2, and ISO 27001 attestations on the API surface.
Where it fits in the stack
Deployment and implementation
Licensing and packaging
Checkmarx One Advanced
Adds API Security alongside DAST, IaC Security, Malicious Package Protection, and Repository Health to the Essentials baseline.
Best for: Programs adding API Security to an existing SAST or SCA footprint.
Checkmarx One Enterprise
Advanced plus AI agents (Developer Assist, Triage and Remediation), AI Supply Chain Security, Software Supply Chain Security, and premium SLAs.
Best for: Enterprise programs running API Security inside a fully consolidated AppSec platform.
Merito services
Merito sells licenses and the delivery work around them. Pick the service that matches where you are in the lifecycle.
Tenant setup, runtime discovery configuration, schema-source wiring, drift-detection rules, and findings-routing design.
Explore service02AppSec program scoping for Checkmarx API Security adoption alongside Salt Security, Noname, and StackHawk API.
Explore service03API Security integrated with API gateways, service meshes, and CI/CD release pipelines.
Explore service04Developer enablement and AppSec champion programs around API governance and schema discipline.
Explore service05Named engineer, priority SLAs, and release-time coverage for Checkmarx API Security.
Explore service06Long-term run support including drift-rule maintenance, gateway-integration upkeep, and risk-scoring evolution.
Explore service07Role-based training for AppSec architects, API platform owners, and developers consuming API Security output.
Explore service08Merito-placed AppSec engineers and Checkmarx specialists embedded on long-running programs.
Explore serviceCheckmarx API Security licensing
Pricing arrives with the runtime discovery configuration, schema-source wiring, drift-detection rules, and gateway integration that turn Checkmarx API Security into a working API governance program.
Merito point of view
Merito has audited AppSec programs that ran rigorous DAST against the web frontend and zero scanning against the API surface, then discovered breach exposure on shadow API endpoints nobody knew existed. The web app is the visible part of the application; the API is the structural part. Programs running DAST without API Security are scanning what is easy to scan and missing what an attacker actually exploits.
Merito recommends Checkmarx API Security specifically when the API surface has more than a few dozen endpoints, when schema discipline (OpenAPI in source control) is real or in reach, and when consolidation onto Checkmarx One pays back the integration cost. For programs without authoritative schemas, the runtime discovery still works but loses the drift-detection advantage. Merito surfaces that during scoping rather than overstating what the product delivers without inputs.
Specialist API security vendors (Salt Security, Noname) are competitive on runtime detection and behavioral analytics. Checkmarx API Security differentiates on schema-first integration and cross-product correlation with SAST, SCA, and DAST inside one backlog. Programs picking Checkmarx are picking platform consolidation; programs picking Salt or Noname are picking specialist depth. Both decisions are valid.
What buyers usually underestimate
Related from Merito
Related solutions
Related services
Related products
Frequently Asked Questions
Consultation request
Share your API surface (REST, GraphQL, gRPC), schema posture, and gateway tooling. A Merito Checkmarx specialist follows up within one business day.
Shadow APIs
Reconciles runtime against OpenAPI, GraphQL, and gRPC schemas. Surfaces shadow and zombie endpoints pure DAST cannot see.
Cross-product correlation
API findings cross-link to SAST flow paths and DAST runtime confirmations inside Checkmarx One.
Next step
A Merito Checkmarx API Security engagement starts with runtime discovery and schema reconciliation. Programs running pure DAST against the web frontend are scanning the easy half.