February 2025
ยท 5 min read
The following updates were made to Semgrep in February 2025.
๐ Semgrep AppSec Platformโ
Addedโ
- Semgrep Managed Scans for repositories hosted by Bitbucket Cloud is now in public beta.
- You can now manage your projects' enrollment in Semgrep Managed Scans through the Semgrep API's
/projectand/project/managed-scanendpoints. - A new My teams view for managers is now in private beta. To join this beta, reach out to support@semgrep.com. This view enables managers to view all the teams they are a manager of.
Changedโ
- The Semgrep AppSec Platform-specific metadata fields
semgrep.dev:andsemgrep.policy:are now filtered from the JSON output if you aren't signed into your Semgrep account. See Semgrep JSON and SARIF fields for more information. - The Semgrep Docker image has been updated to use Python 3.12 and OCaml 5.2.1.
- CLI: The output generated from running
semgrep ci --helpno longer includes information about experimental features and flags. - Jira: Jira tickets for Supply Chain findings now display recommended versions of packages in the description.
Fixedโ
- Fixed an issue in Semgrep Editor's Structure Mode where some of the larger language icons overlapped due to limited space.
- Fixed an issue where the instruction links for adding a CI job all lead to GitHub-specific instructions.
- Fixed an issue where the Median Open Age chart didn't display all relevant findings.
- Fixed an issue where Semgrep scans did not complete if there were failures involving
git worktree remove; instead of erring out, Semgrep completes the scan but logs the error.
๐ป Semgrep Codeโ
Addedโ
- Added support for Critical severity level to denote the highest severity level for a Code finding. You can now filter by Critical severity level in Semgrep AppSec Platform, and you can filter for and identify rules that generate critical severity findings in the Semgrep Registry.
- Semgrep Pro rules, which are included in
p/default, have been updated to use this new severity level.
- Semgrep Pro rules, which are included in
- New rules for JavaScript and TypeScript have been added to Semgrep's default ruleset,
p/default. The new rules cover the OWASP Top 10 and the most popular server-side frameworks, like Express, NestJS, Hapi, and Koa. - Cross-file (interfile) analysis now processes JavaScript and TypeScript files together, so that dataflow can be tracked across both languages.