Skip to main content

Eclipse Plugin - Changelog

The following table lists the features and changes that have been implemented for the plugin with the relevant version release.

Plugin Version

Release Date

CLI Version

Improvements

Bug Fixes

2.0.5

Nov 10, 2022

2.0.34

General improvements and bug fixes

2.0.4

Oct 27, 2002

2.0.31

  • We have simplified the integration procedure for IDE plugins. It is no longer required to enter the Base URL or Tenant Name of your Checkmarx One account. Now, you just enter your API Key, and we extract all of the relevant account info from that Key.

  • In the Checkmarx AST settings, there is now a field for adding additional params. This can be used to manually submit the base url and tenant name (in case there is a problem extracting them from the API Key) or to add global params such as --debug or --proxy. To learn more about CLI params, see Global Flags.

  • The filter setting were changed so that by default Not Exploitable and Proposed Not Exploitable vulnerabilities are filtered out of the display.

2.0.3

April 13, 2022

2.0.16

  • Added links to the relevant Codebashing lessons.

  • Automatically shows results for the latest scan of the project and branch that is currently open in the IDE.

  • Fixed problems loading result details when user clicks on several nodes in the tree structure in quick succession.

2.0.2

Mar 2, 2022

2.0.13

  • Added ability to filter results by vulnerability state.

  • Added license content for license approval during installation.

2.0.1

Feb 11, 2022

2.0.12

  • Improved the Attack Vector design

  • Minor bug fixes

2.0.0

Jan 26, 2022

2.0.10

  • Added ability to triage results directly from the IDE console

  • Added a brief description for SAST vulnerabilities

  • Updated UI elements to reflect the new Checkmarx branding (e.g., logo)

1.0.0

Nov 2, 2021

2.0.4

  • Import Checkmarx One scan results into your IDE

  • Show results from all scan types (CxSAST, CxSCA, and KICS)

  • Group results by severity or query name

  • Navigate from results directly to the vulnerable code in the editor

  • Vulnerable code is highlighted in the editor