semgrep

Installation
Summary

Parallel static analysis scanner with automatic language detection, Pro cross-file taint tracking, and merged SARIF output.

  • Supports two scan modes: "run all" (complete ruleset coverage) and "important only" (high-confidence security vulnerabilities filtered by severity and impact)
  • Automatically detects Semgrep Pro availability for cross-file taint analysis; falls back to OSS mode with per-file scanning
  • Includes third-party rulesets from Trail of Bits, 0xdea, and Decurity alongside official rules to catch vulnerabilities absent from the default registry
  • Spawns parallel scanner subagents for multi-language codebases; merges all results into a single SARIF file with severity and category breakdown
  • Requires explicit user approval of the scan plan (languages, rulesets, mode, target directory) before execution begins
SKILL.md

Semgrep Security Scan

Run a Semgrep scan with automatic language detection, parallel execution via Task subagents, and merged SARIF output.

Essential Principles

  1. Always use --metrics=off — Semgrep sends telemetry by default; --config auto also phones home. Every semgrep command must include --metrics=off to prevent data leakage during security audits.
  2. User must approve the scan plan (Step 3 is a hard gate) — The original "scan this codebase" request is NOT approval. Present exact rulesets, target, engine, and mode; wait for explicit "yes"/"proceed" before spawning scanners.
  3. Third-party rulesets are required, not optional — Trail of Bits, 0xdea, and Decurity rules catch vulnerabilities absent from the official registry. Include them whenever the detected language matches.
  4. Spawn all scan Tasks in a single message — Parallel execution is the core performance advantage. Never spawn Tasks sequentially; always emit all Task tool calls in one response.
  5. Always check for Semgrep Pro before scanning — Pro enables cross-file taint tracking and catches ~250% more true positives. Skipping the check means silently missing critical inter-file vulnerabilities.

When to Use

  • Security audit of a codebase
  • Finding vulnerabilities before code review
  • Scanning for known bug patterns
  • First-pass static analysis
Related skills
Installs
3.8K
GitHub Stars
5.1K
First Seen
Jan 19, 2026