Malicious Software Packages Protection - Checkmarx

FOR DEVELOPERS | Get a 1-month free trial of Developer Assist

Get Started

Checkmarx One

Malicious Package Protection

Identify – and eliminate the dangers of – malicious open-source packages throughout the SDLC, leveraging the industry’s largest database of malicious packages.

image_Hero_MPP

Reduce the Risks of Malicious Packages

Leverage Checkmarx’ automated scanning technologies and massive proprietary database of 420,000+ malicious packages to identify and remediate dangerous open-source code in your applications.

Deep Malicious Package Detection

_deep_malicious_package_detection

Checkmarx detects all open-source packages in use, including dependencies of other packages, to identify those known to contain malware or exhibit suspicious behavior.

Unparalleled Malicious Packages Database

Unparalleled Malware Database

Checkmarx’ multi-layered package analysis methodologies have identified more than 420,000 malicious packages to date.

From Pre-Production to Runtime

Detection Across the SDLC

Checkmarx detects malicious packages in manifest files, binaries, and containers – and correlates runtime usage data available from Sysdig to prioritize remediation efforts.

Package Reliability Metrics

Package Reliability Metrics

Checkmarx rates the trustworthiness of each open-source package included in your applications, by package legitimacy, behavioral integrity and contributor reputation.

Automated Policy Actions

Automated Policy Actions

Defined policies automatically take effect when malicious packages are detected. This can include sending alerts, generating incident reports, preventing pull requests and breaking builds.

  • Deep Malicious Package Detection

    Checkmarx detects all open-source packages in use, including dependencies of other packages, to identify those known to contain malware or exhibit suspicious behavior.

  • Unparalleled Malicious Packages Database

    Checkmarx’ multi-layered package analysis methodologies have identified more than 420,000 malicious packages to date.

  • From Pre-Production to Runtime

    Checkmarx detects malicious packages in manifest files, binaries, and containers – and correlates runtime usage data available from Sysdig to prioritize remediation efforts.

  • Package Reliability Metrics

    Checkmarx rates the trustworthiness of each open-source package included in your applications, by package legitimacy, behavioral integrity and contributor reputation.

  • Automated Policy Actions

    Defined policies automatically take effect when malicious packages are detected. This can include sending alerts, generating incident reports, preventing pull requests and breaking builds.

_deep_malicious_package_detection
Unparalleled Malware Database
Detection Across the SDLC
Package Reliability Metrics
Automated Policy Actions
Mid Page CTA Background

Trust Checkmarx to Reduce Open-Source and Third-Party Risk

Leading enterprises leverage Checkmarx’ massive database of 420K+ malicious packages to eliminate the threats of malware in third-party software libraries.

What’s in it for you

Protect your Organization from the Dangers of Malicious Packages

Reduce OSS security threats and improve your overall security posture by ensuring that no malicious or suspicious third-party packages are putting your organization at risk.

Unmatched OSS Risk Visibility

Unmatched Visibility into Open-Source Risk

Confidently prevent malicious threats by leveraging the industry’s largest OSS malware database and comprehensive code-to-cloud risk management capabilities.

Development Environment Protection

Development Environment Protection

Automatically identify and block malicious or suspicious packages before they are installed in the dev environment or pushed to code repositories.

Efficient Prioritized Remediation

Efficient & Prioritized Remediation

Focus the efforts of your AppSec teams and developers on the open-source malware risks that pose the greatest threats to your organization.

What Our Customers Say About Us

Learn why a growing list of enterprises rely on our approach to application security.

“We view Checkmarx as our trusted partner. They’ve elevated our security posture by consolidating our SAST, SCA, and API Security into a unified platform, Checkmarx One, enabling us to achieve vulnerability remediation, reduce noise, and benefit from strong support.”

“Incorporating Checkmarx’s technology has revolutionized our development culture. It’s more than just technology; it serves as the foundation of our security strategy, ensuring that our applications are secure by design.”

“Checkmarx One definitely checks all my boxes from a security standpoint and has a great interface that’s engaging and easy to use. Some of the solutions we considered were more complicated. With Checkmarx One, it’s easy to get right to the problem with little to no learning curve.”

“The success of our AppSec program can be directly attributed to the tooling, processes and support provided by Checkmarx managed services. Our mission revolves around providing secure and compliant lottery and gaming applications and services to our clients around the globe, and with Checkmarx SAST, SCA and associated components enhanced by their stellar service support, we deliver on this promise with confidence and certainty.”

“After nearly nine years of using Checkmarx’s SAST, CGI’s journey has been one of seamless integration and consistent satisfaction. The last three years have been particularly smooth, reflecting the solution’s reliability and our successful partnership.”

“After reviewing the Checkmarx platform, I’m not sure how Veracode is able to exist while being at a similar price point.”

“By Far The Best AppSec Tooling Decision We Have Made!!”

“We were thrilled to find Checkmarx, which helped us improve the SLA for identifying and remediating risk, reduce risk and the number of vulnerabilities, and eliminate high- and medium-risk issues.”

“Checkmarx made security team and developers life easier.”

FAQ

What are malicious packages?

A malicious package is a piece of code disguised as a legitimate software component but designed to harm systems or steal data. Unlike packages that only contain unintentional security weaknesses (vulnerabilities) that can potentially be exploited by bad actors, malicious packages are designed and propagated with malevolent intent.

How prevalent are malicious packages?

The threat level to organizations of supply chain attacks in general, and malicious packages in particular, has been rapidly rising over the past few years. The numbers tell a disturbing story: Checkmarx’ AppSec research team has discovered more than 420,000 publicly available malicious packages (as of November 2024). 76% of CISOs are concerned about the dangers of malicious packages (Checkmarx survey, 2024). The average cost of a software supply chain compromise was $4.63 million, which is 8.3% higher than the average cost of a data breach due to other causes (IBM, 2023). It is imperative that CISOs and AppSec teams place more focus on this critical threat vector.

How does Checkmarx identify malicious packages?

Checkmarx combines proprietary technology with a team of expert security researchers to effectively identify malicious packages. Our threat intelligence system performs automated tests to identify suspicious package behaviors, author reputation, and additional checks (secrets, code scanning, static analysis, etc.). When a package is flagged as potentially malicious, our security research team conducts a thorough manual review to confirm its malicious nature, and avoid false positives, before adding it to our database (and reporting it externally, when appropriate). On average, Checkmarx scans nearly 2 million OSS packages every month.

What are examples of malicious and suspicious package behaviors?

A few examples include data exfiltration (stealing sensitive information), harmful file download, network connection to domain address known to be used by attackers, crypto-mining software, repojacking (takes control of the repository of a legitimate package), typosquatting (mimics the name of a popular package, inducing users to inadvertently use this package), chainjacking (stores a package in a renamed GitHub repository), and protestware (software that includes functionality which aims to protest an issue).

How can I protect myself from malicious packages?

The most effective way to prevent harm to your organization from malicious packages is to validate each package before it is installed. Beyond this, it is important to frequently scan all the OSS packages used in your applications and container images, to identify and remove/update any package versions that may have been flagged as containing malicious or suspicious code (note that most SCA solutions check for packages with vulnerabilities, but do not identify malicious packages). Other best practices include only using trusted repositories, only using OSS from reputable authors/maintainers, and keeping packages updated to the latest versions (so that you are benefiting from the most recent security patches). Learn more about CheckmarxSCA scan technology.

Where do most malicious packages come from?

Bad actors tend to focus on widely used packages and widely used repositories. Prominent examples include distributing JavaScript npm malicious packages via the npm Registry, Python malicious packages via the Python Package Index (PyPI), .NET NuGet malicious packages via the NuGet Gallery, and all types of malicious software packages via GitHub Packages.

Checkmarx One

The Cloud-Native Enterprise Application Security Platform

Checkmarx One delivers a full suite of enterprise AppSec solutions in a unified, cloud-based platform that allows enterprises to secure their applications from the first line of code to deployment in the cloud. Get everything your enterprise needs to integrate AppSec across every stage of the SDLC and build a successful AppSec program.

Explore Checkmarx One Packaging & Pricing

Application Security Posture
Management (ASPM) Consolidated, correlated, prioritized insights to help your team manage risk

  • Developer Assist

  • Remediation Assist

  • SAST

  • DAST

  • API Security

  • AI-Generated Code Analysis

Supply Chain

Agentic Security
  • Triage Assist

  • SCA

  • Malicious Packages

  • Secrets Detection

  • Repository Health

  • AI Supply Chain Governance

  • LLM & Agent Governance

  • Container Security

  • IaC Security

Dev Enablement

  • Codebashing

DevSecOps

  • 75+ Languages

  • 100+ Frameworks

  • 75+ Technologies

  • SDLC Integrations

  • ADLC Integrations

  • IDE Integrations

  • Pipeline Policy Enforcement

Services

  • Premium Support

  • Premium Services

  • Maturity Assessment

Dev Enablement

  • Codebashing

    Codebashing

DevSecOps

  • 75+ Languages

    75+ Languages

  • 100+ Frameworks

    100+ Frameworks

  • 75+ Technologies

    75+ Technologies

  • SDLC Integrations

    SDLC Integrations

  • ADLC Integrations

    ADLC Integrations

  • IDE Integrations

    IDE Integrations

  • Pipeline Policy Enforcement

    Pipeline Policy Enforcement

Unified Dashboard, Reporting & Risk Management

Application Security Posture
Management (ASPM)

Consolidated, correlated, prioritized insights to help your team manage risk

Agentic Security

Code

  • Developer Assist

    Developer Assist

  • Remediation Assist

    Remediation Assist

  • SAST

    SAST

  • DAST

    DAST

  • API Security

    API Security

  • AI-Generated Code Analysis

    AI-Generated Code Analysis

Supply Chain

  • Triage Assist

    Triage Assist

  • SCA

    SCA

  • Malicious Packages

    Malicious Packages

  • Secrets Detection

    Secrets Detection

  • Repository Health

    Repository Health

  • AI Supply Chain Governance

    AI Supply Chain Governance

  • LLM & Agent Governance

    LLM & Agent Governance

Cloud

  • Container Security

    Container Security

  • IaC Security

    IaC Security

Services

  • Premium Support

    Premium Support

  • Premium Services

    Premium Services

  • Maturity Assessment

    Maturity Assessment

Get a Demo

Discover Checkmarx’ Malicious Package Protection

See how easy it is to ensure that malicious and suspicious OSS packages do not put your business at risk.

Stop Malicious Packages Before They Compromise Your Build

  • Stop supply‑chain malware early: Detect malicious & suspicious OSS across ecosystems with the industry’s largest database (420k+), not just CVE‑tracked vulns.

  • Detect across the SDLC: Manifests, binaries, containers – plus runtime correlation to prioritize what’s actually in use.

  • Automate policy actions: Block builds and enforce guardrails to reduce mean‑time‑to‑contain.

  • Developer‑first prevention: Surface malicious‑package alerts directly in the IDE via Developer Assist to fix before commit.

  • One platform view: Fold MPP into Checkmarx One for unified reporting across SAST, SCA, IaC, Secrets.

Trusted By: