Skip to content

Commit bbc0329

Browse files
Deprecate Turbo Mode in Docs (#2194)
\
1 parent 34aa09d commit bbc0329

File tree

3 files changed

+12
-14
lines changed

3 files changed

+12
-14
lines changed

docs/semgrep-code/editor.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,6 @@ tags:
1010
description: "Semgrep Editor is a powerful tool within Semgrep AppSec Platform to write rules and quickly apply these rules across an organization to enforce coding standards across an organization."
1111
---
1212

13-
import EnableTurboMode from "/src/components/procedure/_enable-turbo-mode.md"
1413
import DeleteCustomRule from "/src/components/procedure/_delete-custom-rule.mdx"
1514
import InstallPrivateGitHubApp from "/src/components/procedure/_install-private-github-app.mdx"
1615
import ForkExistingRule from '/src/components/reference/_fork_existing_rule.md'
@@ -142,7 +141,7 @@ Advanced mode is a YAML editor that allows you to write rules using [Semgrep syn
142141
:::info Rules syntax
143142
Refer to [Rule syntax](/writing-rules/rule-syntax) for all possible fields and values to create a rule.
144143

145-
To quickly learn Semgrep patterns and syntax, explore the Editor’s library of rules from the **public [Rule Registry](https://semgrep.dev/explore)**. Rules from the Registry can detect OWASP vulnerabilities, best practice violations, and security issues for a wide variety of languages and frameworks. Semgrep Editor enables you to **adapt these rules** for your own organizations use by [forking](#write-a-new-rule-by-forking-an-existing-rule) them.
144+
To quickly learn Semgrep patterns and syntax, explore the Editor’s library of rules from the **public [Rule Registry](https://semgrep.dev/explore)**. Rules from the Registry can detect OWASP vulnerabilities, best practice violations, and security issues for a wide variety of languages and frameworks. Semgrep Editor enables you to **adapt these rules** for your own organization's use by [forking](#write-a-new-rule-by-forking-an-existing-rule) them.
146145
:::
147146

148147
To write a rule in advanced mode:
@@ -179,9 +178,7 @@ In addition to testing for matches, you can test that your rule doesn't match wh
179178

180179
Once you've written a rule and created comment annotations, you can run your rule against your comment annotations by clicking **Run**. You can also press <kbd>Ctrl</kbd>+<kbd>Enter</kbd> (<kbd>⌘</kbd>+<kbd>Enter</kbd> on Mac).
181180

182-
### Turbo mode (beta)
183181

184-
<EnableTurboMode />
185182

186183
## Code search (beta)
187184

@@ -227,7 +224,7 @@ Upon saving, a rule’s visibility is **private** by default. A private rule is
227224

228225
Some older rules in Semgrep AppSec Platform may be **unlisted** rather than private. These rules are marked with an icon without a lock, and can be shared with anyone, including those who cannot access Semgrep AppSec Platform.
229226

230-
To change an unlisted rule's visibility to private for increased security, click **Share > Private > Confirm**.
227+
To change an unlisted rules visibility to private for increased security, click **Share > Private > Confirm**.
231228

232229
## Rename a rule
233230

docs/writing-rules/experiments/deprecated-experiments.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -140,3 +140,13 @@ The value of `reduce` key must be one of the following:
140140
Although extract mode supports JSON array decoding with the `json` key, it does not support other additional processing for the extracted text, such as unescaping strings.
141141

142142
While extract mode can help to enable rules which try and track taint across a language boundary within a file, taint rules cannot have a source and sink split across the original file and extracted text.
143+
144+
## Turbo Mode
145+
146+
:::note
147+
As of June 16th, 2025, Turbo Mode has been deprecated and removed from the Semgrep Playground.
148+
:::
149+
150+
Turbo Mode was a feature in Semgrep Editor that automatically ran your rule against Semgrep CE after every keystroke or change to the rule.
151+
152+

src/components/procedure/_enable-turbo-mode.md

Lines changed: 0 additions & 9 deletions
This file was deleted.

0 commit comments

Comments
 (0)