You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/deployment/deployment-checklist.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -318,7 +318,7 @@ Semgrep requires the following permissions (scopes) to enable the authentication
318
318
319
319
The [Semgrep Network Broker](/docs/semgrep-ci/network-broker) facilities secure access with Semgrep, and its use can replace the allowlisting of the IP addresses required for ingress. The Network Broker, however, only facilitates requests from Semgrep to your network and *doesn't* assist with requests originating from your network, including those from your network to Semgrep.
320
320
321
-
In other words, the only address you would have to allow inbound is `wireguard.semgrep.dev` on UDP port `51820`, but depending on how restrictive your network is, you may need to modify your allowlist to include the egress IP addresses provided in [IP addresses](#ip-addresses).
321
+
In other words, the only address you would have to allow inbound is `wireguard.semgrep.dev` on UDP port `51820`, or your tenant's equivalent. Depending on how restrictive your network is, you may also need to modify your allowlist to include the egress IP addresses provided in [IP addresses](#ip-addresses).
322
322
323
323
#### Features that require inbound network connectivity
Copy file name to clipboardExpand all lines: docs/deployment/manage-projects.md
+8Lines changed: 8 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,6 +8,8 @@ tags:
8
8
- Semgrep AppSec Platform
9
9
---
10
10
11
+
import DeleteAProject from "/src/components/procedure/_delete-a-project.md"
12
+
11
13
# Manage projects
12
14
13
15
View, sort, and tag your projects through the **Projects** page. Refer to this page to manage and troubleshoot thousands of repositories by identifying scan issues or scans with a high number of findings.
@@ -91,3 +93,9 @@ See the following pages for more information:
91
93
- For Semgrep Managed Scans users: [configure your scans](/deployment/managed-scanning/overview).
92
94
-[Set a primary branch](/deployment/primary-branch).
93
95
-[Set tags](/semgrep-appsec-platform/tags).
96
+
97
+
## Delete a project
98
+
99
+
Deleting a project removes all of its findings, metadata, and other records from Semgrep AppSec Platform.
Copy file name to clipboardExpand all lines: docs/index.md
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -128,14 +128,16 @@ See the [Supported languages](/supported-languages#language-maturity-summary) do
128
128
</div>
129
129
-->
130
130
131
-
<h3>November 2025 release notes summary</h3>
131
+
<h3>December 2025 release notes summary</h3>
132
132
<!-- 5-7 bullets across the product suite -->
133
133
134
-
-**Cortex** and **Sysdig** integrations are now generally available. Semgrep now uses deployment status and, for Cortex, internet-exposure data from these CNAPP providers to better prioritize findings.
135
-
- Malicious dependency detection is now generally available. Semgrep detects malicious packages, including malware, typosquatting, and credential-stealing dependencies, using over 80,000 rules.
136
-
- Assistant now automatically analyzes **all new Critical and High-severity findings** with **Medium or High confidence** in full scans, removing the previous 10-issue limit.
137
-
- The **Settings > General** tab now displays all Semgrep product settings on a single page.
134
+
- Added a new **Priority** tab on **Findings** page to display high-priority findings. Each product has default priority categories, and Semgrep admins can customize the **Priority** tab to control which findings appear. Admins can save **Priority** tab filters for all users.
135
+
- Added a new **Provisionally ignored** finding status.
136
+
- Semgrep Secrets findings are now assigned a severity of **Critical**. This applies to Secrets findings from scans performed after November 2025. Any existing findings from those rules will be updated to **Critical** after the project's next full scan.
137
+
- Pull request comments for findings generated using Semgrep-authored rules now include Assistant-generated explanations to help developers understand the findings. The summary message can be expanded to show additional details.
138
+
- Added support for Cursor post-generation hooks, enabling Semgrep to integrate with Cursor workflows after code generation.
139
+
- The **Findings** page now has improved navigation and more intuitive links. The code path now opens the finding's **Details** page, and an in-product tour introduces the new layout.
138
140
139
141
[See the latest release notes <iclass="fa-solid fa-arrow-right"></i>](/release-notes)
140
142
141
-
<divstyle={{textAlign:'right'}}>[<iclass="fa-solid fa-rss"></i> Subscribe to RSS feed ](https://semgrep.dev/docs/release-notes/rss.xml)</div>
143
+
<divstyle={{textAlign:'right'}}>[<iclass="fa-solid fa-rss"></i> Subscribe to RSS feed ](https://semgrep.dev/docs/release-notes/rss.xml)</div>
Copy file name to clipboardExpand all lines: docs/mcp.md
+14-8Lines changed: 14 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,7 +51,7 @@ This article includes instructions for setting up the MCP server with Cursor and
51
51
semgrep --version
52
52
```
53
53
54
-
1. Log in to Semgrep and install Semgrep Pro
54
+
1. Log in to Semgrep and install Semgrep Pro:
55
55
56
56
```
57
57
semgrep login && semgrep install-semgrep-pro
@@ -96,21 +96,27 @@ This article includes instructions for setting up the MCP server with Cursor and
96
96
```bash
97
97
semgrep --version
98
98
```
99
+
3. Start a new Claude Code instance in the terminal:
100
+
```bash
101
+
claude
102
+
```
99
103
100
-
3. Sign in to your Semgrep account. Running this command launches a browser window, but you can also use the link that's returned in the CLI to proceed:
104
+
4. Add the Semgrep marketplace to Claude:
101
105
```bash
102
-
semgrep login
106
+
/plugin marketplace add semgrep/mcp-marketplace
103
107
```
104
-
In the **Semgrep CLI login**, click **Activate** to proceed.
105
108
106
-
4. Return to the CLI, and install the Semgrep Pro engine:
Copy file name to clipboardExpand all lines: docs/semgrep-appsec-platform/jira.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -81,7 +81,8 @@ The Jira integration automatically detects other Jira projects in your subdomain
81
81
- Those projects have the same **Issue type** as the default project. [When you triage a finding](#code), you can choose which project to create the tickets in.
82
82
83
83
:::caution Same name, different ID
84
-
Issue types may have the same name, but a different Issue type ID. When creating tickets, only company-managed Jira projects with the same issue type ID as the default project selected in the integration will appear. If you can't select other Jira projects when creating tickets, check that the Issue type ID is the same across Jira projects. See the [<iclass="fas fa-external-link fa-xs"></i> How to identify the Jira Issue ID in Cloud](https://support.atlassian.com/jira/kb/how-to-identify-the-jira-issue-id-in-cloud/) for details.
84
+
Issue types may have the same name but different Issue type IDs. When creating tickets, only company-managed Jira projects whose issue type ID matches the default project selected in the integration will appear in the list of available projects.
85
+
If you don't see other Jira projects when creating tickets, check that the Issue type ID is the same across Jira projects. See the [<iclass="fas fa-external-link fa-xs"></i>Finding the Issue Type ID in Jira Cloud](https://support.atlassian.com/jira/kb/finding-the-issue-type-id-in-jira-cloud/) for details.
Copy file name to clipboardExpand all lines: docs/semgrep-assistant/overview.md
+19-4Lines changed: 19 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,20 +30,35 @@ Semgrep Assistant:
30
30
- Requires the Semgrep AppSec Platform for its use
31
31
- Auto-analyzes many, but not all, findings during scans
32
32
- For full scans, all *new* issues that have **Critical** or **High** severity AND **High** or **Medium** confidence are auto-analyzed
33
-
- For diff-aware scans (pull pequest or merge request scans), up to 10 new issues are auto-analyzed per scan
33
+
- For diff-aware scans (pull request or merge request scans), up to 10 new issues are auto-analyzed per scan
34
34
35
35
## Features
36
36
37
+
38
+
### Explanation
39
+
40
+
Semgrep Assistant explains why a finding is a true positive by connecting the rule’s message to the code that triggered it. It highlights the relevant lines of code along with the surrounding context and describes how the rule applies in this specific case. For security rules, Assistant also connects the finding back to the threat model, showing the potential risk and why the code behavior matters.
41
+
42
+
The explanation helps you understand not just *which* rule triggered a finding, but *why* the code is considered problematic.
43
+
44
+
On the finding’s **Details** page:
45
+
46
+
* Semgrep Assistant’s explanation appears in the **Finding description** tab.
47
+
* The rule that triggered the finding is described in the **Rule description** tab.
48
+
* The exact lines of code that caused the finding are displayed in the **Your code** tab. Click a line to highlight the relevant code in context.
49
+
50
+
For true positive findings, the same Assistant-generated explanations are also included in pull request or merge request comments. A brief summary appears in the default view. Expand **More details about this** to view the full Assistant-generated explanation.
51
+
52
+
Note that Assistant-generated explanations are **not** available for custom rules or community rules.
53
+
37
54
### Remediation
38
55
39
56
Semgrep Assistant can provide remediation advice and autofixes, or suggested fixes, for Semgrep Code findings.
40
57
41
58
#### Guidance
42
59
43
-
With Assistant enabled, PR or MR comments from Semgrep include step-by-step remediation instructions for the finding identified by Semgrep Code.
60
+
With Assistant enabled, pull request or merge request comments from Semgrep include step-by-step remediation instructions for the finding identified by Semgrep Code.
44
61
45
-

46
-
_**Figure.** PR comment displaying the rule message followed by a comment that contains Assistant-generated remediation guidance._
47
62
48
63
Semgrep also displays remediation information on Semgrep AppSec Platform's **Findings page** under **Your code & fix** in the [finding's details](/semgrep-code/findings#view-details-about-a-specific-finding) page.
Copy file name to clipboardExpand all lines: docs/semgrep-supply-chain/license-compliance.md
+11Lines changed: 11 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,6 +53,17 @@ To change the policies of packages based on the license:
53
53
1. Click the permission (**Allow**, **Comment**, or **Block**) you want to set the license to.
54
54
2.**Optional**: Block entire categories of licenses by clicking on the **Set all to** drop-down box next to the license category.
55
55
56
+
## License information
57
+
58
+
License information is often stored in the package's repository alongside the source code. You can generally find this information in:
59
+
60
+
- A license file, such as `LICENSE` or `LICENSE.txt`
61
+
- The manifest file, such as the `pyproject.toml` or `package.json`, which typically specifies a `license` field
62
+
63
+
Semgrep uses [deps.dev](https://deps.dev/) as the primary source for license data, which is then displayed in Semgrep AppSec Platform.
64
+
65
+
[deps.dev](https://deps.dev/) aggregates license metadata from package registry APIs, such as PyPI and npm. This metadata is provided by package maintainers through their manifest files and may be missing, incomplete, or inaccurate. If the license data displayed in Semgrep AppSec Platform for a particular package is missing or doesn't show the expected value, the data provided by the package maintainer to populate the package registry API is likely incomplete or incorrect.
66
+
56
67
## License categories
57
68
58
69
Semgrep Supply Chain can identify the following licenses and license categories.
0 commit comments