Try the Semgrep Supply Chain reachability challenge! Play now!
Find and fix the issues that matter in your code (SAST)
Find and fix reachable dependency vulnerabilities (SCA)
Find and fix hardcoded secrets with semantic analysis
Get triage and code fix recommendations from AI
Automate, manage, and enforce security across your organization
Find more true positives and fewer false positives with dataflow analysis
Stay up to date on changes to the Semgrep platform, big and small
Mitigate software supply chain risks
Increase security while accelerating development
Prevent the most critical web application security risks
Want to read all the docs? Start here
Get the latest news about Semgrep
See how Semgrep can save you time and money
Join the friendly Slack group to ask questions or share feedback
Join us at a Semgrep Event!
See why users love Semgrep
View our library of on-demand webinars
Users can now scan for valid secrets in their repo's git history! This functionality is off by default, so users will have to toggle it on in the settings menu or run semgrep ci
with --historical-secrets
.
A few things to note:
Historical scanning can be slow with large repos.
Findings from historical scans will not be automatically be marked as fixed. Currently these findings can only exist in two states: Open
or Ignored
.
Please don't hesitate to share any feedback with your account team!