Semgrep now lets you filter by project tags. You can use this filter to only see issues associated with a subset of projects.
Note: we only list tags if they are associated with at least 1 project. If a tag is not showing up as an option, it’s most likely because it’s not yet linked to any particular project.
PS: there are more filtering capabilities on the horizon, so stay tuned!
You can now use anonymous metavariables when writing or customizing rules, which have the form $_
. These metavariables do not bind in the environment, meaning they also do not unify. As such, patterns like:
foo($_, $_)
can match code like
foo(1, 2)
Happy rule writing!
Users can now select findings and use the "Analyze" button to run all Semgrep Assistant functions (autofix, autotriage, and component tagging) on the selected findings. Once the analysis is completed, users will see results if they:
filter by Fix/Ignore
filter by AI Component Tags
If they select "No Grouping" instead of "Group by Rule" they will see false positive or true positive recommendations directly in their findings.
Semgrep Assistant (Semgrep’s AI integration) can now categorize and tag findings based on the component they are found in. Users can use these tags to prioritize findings (only show findings related to user authentication, PII, etc.).
Semgrep's VSCode extension (v1.6.2+) can run natively on Windows. Semgrep Platform uses LSP.js as a way of supporting Semgrep on Windows.
Go, Java, Javascript, and Typescript’s interfile analysis support is now GA. All cross-functional analysis language support is now GA.
Learn more
Users can now scan C# projects with Semgrep Code’s Pro Engine, leveraging advanced interfile analysis to uncover more complex vulnerabilities while reducing noise.
SBOM export (in public beta) is now supported on any repository that Semgrep Supply Chain scans. Users can export SBOM in CycloneDX v1.4 standard in JSON or XML format.
Learn more
Semgrep Supply Chain public API release; users can list all their Supply Chain Vulnerabilities and list all their Dependencies in a raw list or with respect to their repositories and lockfiles.