Checkmarx SAST is the static analysis engine inside Checkmarx One. Its language breadth covers JavaScript and TypeScript, Java, C# and .NET, Python, Go, Rust, Ruby, PHP, Kotlin, Scala, Swift, C/C++, Apex, and COBOL. The same engine handles modern microservices and the legacy stacks regulated enterprises still maintain, which is the reason large AppSec programs pick Checkmarx over single-language specialists.
Two engine features carry most of the program-level value. Best Fix Location returns one fix point per logical vulnerability instead of dumping every flow path as a separate ticket and tells the developer where one edit closes the most paths. Custom rules through the CxQL query language let AppSec teams encode internal standards (must use this internal crypto wrapper, must validate input through this gateway, must not log this PII field) so policy enforcement runs inside the scanner instead of being managed in a separate document nobody reads.
The Exploitable Path Analysis (EPA) signal extends from SCA into SAST findings: vulnerabilities in code paths that are not actually called from production entry points get demoted, so the backlog reflects what an attacker can reach instead of every theoretically vulnerable line. On portfolios with deep dependency trees and large legacy footprints, that distinction is the difference between a 50,000-finding backlog nobody touches and a several-thousand-finding queue that AppSec actually works.
What kills SAST adoption is policy drift. Programs that take vendor-default policies and never tune them generate huge false-positive volumes, lose developer trust by month two, and eventually become a checkbox scan that nobody reads. Merito's engagement starts with policy tuning to the customer's risk tolerance, suppression discipline that is auditable rather than a graveyard of ignored findings, and PR-time integration so developers see results in the workflow they already use.
Ideal use cases
- Enterprise SAST consolidation across heterogeneous codebases
- Migrating off Veracode or Fortify SCA onto Checkmarx One
- PR-time SAST gates in Jenkins, GitHub Actions, GitLab CI, or Azure DevOps
- Custom-rule authoring (CxQL) for internal coding standards
- Regulated SAST evidence for PCI, HIPAA, FedRAMP, or SOC 2 audits