Feel secure about our pricing
We make it expensive to exploit software, not to secure it.
Feel secure about our pricing
We make it expensive to exploit software, not to secure it.
The most popular open-source SAST engine on GitHub — trusted by millions of developers worldwide.
Extensible AppSec for growing teams. Choose from Code (SAST), Supply Chain (SCA), and Secrets Detection to eliminate noise out of the box, streamline developer workflows, and give security teams full visibility.
Built for impact and scale. Get the same powerful AppSec platform as Teams — plus white glove onboarding, dedicated support, roadmap access, and a team deeply invested in your success.
Frequently Asked Questions (FAQs)
A contributor is someone who made a commit to your organization's private repository scanned by Semgrep in the past 90 days.
Many of us were security consultants in our previous roles. To inquire about using Semgrep in your consulting work, please contact us.
Yes, and we love startups. To get access to special pricing, please contact us.
No. Semgrep runs either locally or fully in your CI pipeline, and your source code never leaves your computer or your CI environment. Only meta-data related to Semgrep runs (see docs) are sent to Semgrep's service.
If you opt-in to Semgrep Assistant, Semgrep’s automated recommendations for triage and code remediation assisted by GPT-4, the Semgrep Assistant feature submits part of the file that has a finding in it to OpenAI for processing by a GPT model. OpenAI is not allowed to use the submitted code for training their models.
If you opt-in to Semgrep Managed Scans, allowing onboarding of repositories and their scanning without the need for per-project provisioning, then Semgrep’s service clones your repository at the beginning of every scan. Once the scan completes, the clone is destroyed and is not persisted anywhere.
Users in the Teams and Enterprise tiers for Semgrep can publish rules to the Semgrep Registry as Private rules that are not visible to others outside their organization. The private rules enable you to hide code-sensitive information or legal requirements that prevent you from using a public registry.
Pro rules are proprietary rules written by our security research team with the goal to provide a set of supported rules with improved coverage (across languages and vulnerability types), leveraging the latest Semgrep features, and providing high-confidence results.
Need something custom?
Ask us about our Enterprise tier, including customized support plans and feature development.