Skip to main content

Local scans with Semgrep OSS Engine

Learn how to set up Semgrep OSS, scan your codebase for security issues, and view your findings in the CLI.


See Prerequisites to ensure that your machine meets Semgrep's requirements.

Set up Semgrep

Install the Semgrep CLI and confirm the installation:

# macOS users only
brew install semgrep

# macOS, Linux, or Windows Subsystem for Linux (WSL) users
python3 -m pip install semgrep

# confirm
semgrep --version

Scan your codebase

Navigate to the root of your codebase, and run your first scan. The specific command you use depends on how you want to view the results.

To run a scan using recommended rules for your programming language, and view the results in the CLI:

semgrep scan

To export the results to a plain text file:

semgrep scan --text --output=semgrep.txt

To export the results to a SARIF file:

semgrep scan --sarif --output=semgrep.sarif

To export the results to a JSON file:

semgrep scan --json --output=semgrep.json

Scan your codebase with a specific ruleset

You can scan your codebase using --config auto to run Semgrep with rules that apply to your programming languages and frameworks:

semgrep scan --config auto --pro

Semgrep collects pseudonymous metrics when you use rules from the Registry. You can turn this off with --metrics=off.

To scan your codebase with a specific ruleset, either one that you write or one that you obtain from the Semgrep Registry, use the --config flag.

# Scan with the rules defined in rules.yaml
semgrep scan --config rules.yaml

You can include as many configuration flags as necessary.

# Scan with rules defined in two separate config files
semgrep scan --config rules.yaml --config more_rules.yaml

Rules stored under a hidden directory, such as dir/.hidden/myrule.yml, are processed by Semgrep when scanning with the --config flag.

Scan with rules in a directory and all its subdirectories:

semgrep scan --config DIRECTORY_NAME

Scan with all YAML rules detected in the current working directory and all its subdirectories:

semgrep scan --config .

Test custom rules

Semgrep includes functionality to test the custom rules that you write:

semgrep scan --test

Improve performance for large codebases

You can set the number of subprocesses Semgrep uses to run checks in parallel:


By default, the number of jobs Semgrep uses is equivalent to the number of cores detected on the system.

Set log levels

Semgrep provides three levels of logging:

Log levelFlagDescription
DefaultNonePrints scan progress, findings information, warnings, and errors.
Verbose-v or --verboseIncludes everything printed when using the default logging level, adding a list of rules and details such as skipped files.
Debug--debugLogs the entire scan process at a high level of detail.

Example usage

To set the logging level for a scan, include the flag when scanning your project:

# run a scan and get debug logs
semgrep scan --debug

Exit codes

The command semgrep scan finishes with exit code 0 as long as the scan completes, regardless of whether there were findings. To finish with exit code 1 when there are findings, pass in the --error flag.

Not finding what you need in this doc? Ask questions in our Community Slack group, or see Support for other ways to get help.