Checkmarx DAST is the dynamic analysis engine inside Checkmarx One. It runs against the deployed application, not the source code, exercising web apps through the UI, REST and GraphQL APIs through the network surface, and mobile apps through the runtime. The output catches what static analysis cannot see: runtime configuration flaws, broken authentication flows, server misconfiguration, business-logic vulnerabilities that only manifest when real requests cross the network boundary.
Authenticated scanning is the load-bearing capability. Most applications worth testing sit behind authentication, and DAST that cannot maintain session through SSO, multi-step login, or token refresh ends up scanning the public landing page and missing the application. Checkmarx DAST handles SAML, OAuth, OIDC, multi-factor flows, and custom session protocols so the scan reaches what the user reaches. Programs running unauthenticated DAST are not running DAST.
Cross-product correlation is the platform advantage. DAST findings cross-reference back to Checkmarx SAST findings on the same code path so AppSec sees both the source-level vulnerability and the runtime confirmation in one ticket. SCA reachability data informs which OSS dependencies the runtime actually exercises. Triage and Remediation clusters DAST findings together with related SAST and SCA findings on root cause. Programs running DAST as a standalone tool against a different vendor's SAST get fragmented findings; programs running Checkmarx DAST inside Checkmarx One get unified backlog math.
What breaks DAST adoption is environment access. DAST needs a runnable application with realistic data, working authentication, and network reachability from the scanner. Programs that run DAST against an empty staging environment with a generic test account scan a hollow shell. Merito's engagement starts with environment readiness (test data, authentication wiring, scan-window scheduling) before pointing the scanner at anything real, and tunes the policy to the specific application surface rather than running default rules across web, API, and mobile as if they were the same.
Ideal use cases
- Authenticated DAST against web applications behind SSO or multi-step login
- API DAST against REST and GraphQL endpoints with token-based authentication
- Mobile DAST for native iOS and Android applications and their backends
- DAST integrated with Checkmarx SAST and SCA for cross-source-and-runtime findings
- Regulated DAST evidence for PCI DSS, HIPAA, and SOC 2 audits