Skip to main content
  • Semgrep Cloud Platform
  • Community Tier
  • Team & Enterprise Tier

Alerts and notifications

Receive notifications in various channels, such as Slack and email, through Semgrep Cloud Platform. This document guides you through setup procedures and Semgrep's deduplication behavior. This ensures that you receive high-signal notifications and alerts in your preferred channels.

Semgrep Cloud Platform provides support for the following channels:

ToolTier availability
SlackCommunity (Free)
EmailCommunity (Free)
GitHub pull request (PR) commentsCommunity (Free)
GitLab merge request (MR) commentsCommunity (Free)

Finding available alert and notification channels

To find available integrations for Semgrep Cloud Platform, follow these steps:

  1. Sign in to your Semgrep Cloud Platform account.
  2. Click Settings.
  3. Click Integrations. Screenshot of Semgrep's "Create New Integration Channel" menu
  4. Click Add Integration (or Setup First Integration if this is your first integration). Screenshot of Integrations page while adding the first integration.

Managing alerts and notifications

To view, add, remove, disable, or enable your saved channels:

  1. In the Settings > Integrations page, explore the options available for specific integration.
  2. In the Rule board, click the gear icon to enable or disable an integration. Screenshot of Semgrep's Rule board integration modal

Adding notification channels


The Semgrep Slack app allows Semgrep Cloud Platform to send findings and notifications to a channel on your Slack workspace.


You must be a Slack workspace owner to set up the Semgrep Slack app.

To install the Semgrep Slack app, follow these steps:

  1. Sign in to your Semgrep Cloud Platform account, and then go to Settings > Integrations.
  2. On the Integrations page, click Add Integration (or Setup First Integration if this is your first integration), and then select Slack.
  3. Click Allow.
  4. In your Slack workspace, find or create a specific channel for Semgrep notifications.
  5. In the selected Slack channel, enter the following slash command:
  6. Choose an organization in the list under Select target organization, and then click Subscribe.
  7. Go to the Semgrep Integrations page and find your Slack integration menu.
  8. Click List of channels receiving Semgrep notifications, and then click Test. Slack integration menu with the **test** button

To see more Slash commands, go to your Slack app homepage, and then click Features to see available Slash commands. The available options are the following:

  • Subscribe to findings with Semgrep:
  • Unsubscribe to findings with Semgrep:

Screenshot of a Slack notification describing the details of a finding Figure 1. A sample Slack message with Semgrep findings.

Slack permissions

The following table describes the purpose for each permission required to use the Semgrep Slack app.

PermissionSlack descriptionPurpose
app_mentions:readView messages that directly mention @Semgrep in conversations that the app is in.Enables the Semgrep Slack app to respond when users mention it in the chat.
channels:readView basic information about public channels in a workspace.Basic channel information such as channel_id is used to ensure that Semgrep findings (results) are sent to the appropriate channel.
chat:writeSend messages as @Semgrep.Enables the Semgrep Slack app to send findings to channels.
chat:write.customizeSend messages as @Semgrep with a customized username and avatar.Helps users identify Semgrep Slack app messages through the use of an image and username.
chat:write.publicSend messages to channels @Semgrep isn't a member of.Enables users to invoke Semgrep Slack app features in any public channel using the slash command.
commandsAdd shortcuts or slash commands that people can use.Enables the Semgrep Slack app to register custom slash commands such as /semgrep_subscribe used for notification subscription.
emoji:readView custom emoji in a workspace.Allows Semgrep to support a workspace's custom emojis.
im:writeStart direct messages with people.Allows users to interact with the Semgrep Slack app and use the slash commands in direct messages.
links:writeShow previews of URLs in messages.Enables Semgrep Slack app to include links in messages.
users:readView profile details about people in a workspace.Enables Semgrep Slack app to correctly address users in messages.
users:writeSet presence for Semgrep.Used by the Semgrep Slack app to interact with the workspace and enables users to add the Semgrep Slack app to relevant channels.
workflow.steps:executeAdd steps that people can use in Workflow Builder.Enables Semgrep to make use of modals and drop-down boxes when a user creates or updates their notifications.
groups:readView basic information about private channels that your Slack app has been added to.Semgrep Slack app uses channels_id_changed to update its notifications config if the channel that receives findings is updated. This ensures that you are able to receive findings ever renaming a channel.
team:readView the name, email domain, and icon for workspaces your slack app is connected to.Semgrep Slack app uses team_name_changed to update its notifications config if the team name is updated. This ensures that you are able to receive findings notifications even after renaming your team.
channels:readView basic information about public channels in a workspace.Enables Semgrep Slack app to monitor if channels that receive Semgrep findings have been deleted or archived.

Additional resources


Receive Semgrep findings via email.

To set up email integration:

  1. In Integrations, click Add Integration.
  2. Click on Email.
  3. Enter a Name for the integration.
  4. Enter the Email address that will receive Semgrep findings.
  5. Click Save.
  6. Turn notifications on by going to the Rule board, clicking on the gear icon, and then click the toggle next to the name of the integration.

Screenshot of Semgrep Cloud Platform email with findings Figure 2. Sample of an email sent from Semgrep with findings.

Number of emails

On each scan that has at least one finding, you will receive one email from Semgrep with a summary of all of the findings from that scan.

GitHub pull request comments

Pull request comments are created when:

  1. Semgrep finds a result in CI.
  2. The Semgrep GitHub App has permissions to post inline PR comments.

Automated comments on GitHub pull requests are displayed as follows:

Screenshot of a GitHub PR comment Figure 3. An inline GitHub pull request comment.

Semgrep Cloud Platform uses the permissions requested by the Semgrep GitHub App to leave PR comments. You can verify that you have granted these permissions by visiting either<your_org_name>/settings/installations or<your_org_name>/<your_repo_name>/settings/installations.

If you are using GitHub Actions to run Semgrep, no extra changes are needed to get PR comments. If you are using another CI provider, in addition to the environment variables you set after following sample CI configurations you need to ensure that the following environment variables are correctly defined:

  • SEMGREP_PR_ID is set to the PR number of the pull request on Github (for example, 2901)
  • SEMGREP_REPO_NAME is set to the repo name (for example, returntocorp/semgrep)
  • SEMGREP_REPO_URL is set to the repository URL where your project is viewable online (for example,

GitLab merge request comments

This section documents how to enable Semgrep Cloud Platform to post comments on merge requests.

Automated comments on GitLab merge requests are displayed as follows:

Semgrep GitLab MR comment Figure 4. An inline GitLab merge request comment.

To enable GitLab merge request comments, follow these steps:

  1. Log into Semgrep's Settings to obtain your deployment ID and an API token.
  2. Create an API token in GitLab by going to Profile > Access Tokens and adding a token with api scope.
  3. Copy the token created in the previous step.
  4. Navigate to your repository > Settings > CI/CD > Variables and click Expand. The URL of the page where you are ends with: /username/project/-/settings/ci_cd.
  5. Click Add variable.
  6. Enter PAT for the key field and use the token you copied in step 3 as the value.
  7. Select mask variable and unselect protect variable.
  8. Update your .gitlab-ci.yml file with variable GITLAB_TOKEN and value $PAT. Refer to the following example:
image: returntocorp/semgrep
- semgrep ci


For more config options, see GitLab CI Sample.


GitLab MR comments are only available to logged-in Semgrep users, as they require a Semgrep API token.

Semgrep Autofix

Autofix is a Semgrep feature in which rules contain suggested fixes to resolve findings. Either metavariables or regex matches are replaced with a potential fix. Due to their complexity, not all rules make use of autofix, but for rules that use this feature, autofix allows you to quickly resolve findings as part of your code review workflow. Semgrep Code can suggest these fixes through PR or MR comments within GitHub or GitLab, thus integrating seamlessly with your review environment.

Autofix is free to use for all tiers.

In the following screenshot, Semgrep detects the use of a native Python XML library, which is vulnerable to XML external entity (XXE) attacks. The PR comment automatically suggests a fix by replacing import xml to import defusedxml.

Screenshot of a sample autofix PR suggestion

Enabling autofix for GitHub or GitLab

Autofix requires PR or MR comments to be enabled for your repository or organization. Follow the steps in GitHub pull request comments or GitLab merge request comments to enable this feature.

To enable autofix for all projects in your Semgrep Cloud Platform organization, follow these steps:

  1. In Semgrep Cloud Platform, click Settings on the left sidebar.
  2. Enable the Autofix toggle.

All scans performed after enabling autofix generate inline PR or MR comments with code suggestions for applicable rules.


Webhooks are a feature available in Semgrep's Team tier and above.

Webhooks are a generic method for Semgrep to post JSON-formatted findings after each scan to your URL endpoint. To set up a webhook:

  1. Go to Settings > Integrations, and then click Add Integration.
  2. Click Webhook.
  3. Enter a Name for the integration.
  4. Enter the Webhook URL.
  5. To ensure that Semgrep can post to your URL, click Test. Successful webhook integration test
  6. Click Save.
  7. Turn notifications on by going to the Rule board, clicking on the gear icon, then click the toggle next to the name of the integration. To receive webhook notifications on pull requests and code pushes, visit Dashboard > Integrations and select 'Add integration' or 'Setup First Integration,' and then choose 'Webhook'. Enter a target URL, give the notification channel a name of your choosing, and then click 'Save'.


"semgrep_finding": {
"id": "241dbe518caf15f800131d2d0c70bf08",
"ref": "refs/pull/2658/merge",
"start_date": "None",
"check_id": "log-exc-info",
"path": "server/semgrep_app/handlers/",
"line": 185,
"column": 9,
"message": "Error messages should be logged with `exc_info=True` in order to propagate\nstack information to Sentry. Either change the logging level or raise an Exception.\n",
"severity": 1,
"index": 0,
"end_line": 187,
"end_column": 10,
"commit_date": "2021-06-07T15:26:35+03:00",
"first_seen_scan_id": "xnkPGY8VL20o",
"category": "security",
"cwe": "CWE-319: Cleartext Transmission of Sensitive Information",
"license": "Commons Clause License Condition v1.0[LGPL-2.1-only]",
"owasp": "A3: Sensitive Data Exposure",
"references": [""],
"source": "",
"technology": ["servlet",  "tomcat"],
"vulnerability": "Insecure Transport",
"metadata": {
"dev.semgrep.actions": [],
"semgrep.policy": {
"id": 8168,
"name": "Web Apps Notify Only",
"slug": "web-apps-notify-only"
"semgrep.url": ""


Semgrep Cloud Platform can send a POST request containing information about the scan.

"semgrep_scan": {
"deployment_id": 1,
"started_at": "2021-09-21T23:49:17.480929+00:00",
"completed_at": null,
"exit_code": null,
"repository": "returntocorp/semgrep-app",
"ci_job_url": "",
"environment": "",
"commit": "e22f08e8e871bde8c100b3a4a6f8e9387d651223",
"commit_committer_email": "",
"commit_timestamp": "",
"commit_author_email": "",
"commit_author_name": "Semgrep User",
"commit_author_username": "semgrepuser",
"commit_author_image_url": "",
"commit_authored_timestamp": "",
"commit_title": "fixup",
"config": "",
"on": "pull_request",
"branch": "refs/pull/3483/merge",
"pull_request_timestamp": "",
"pull_request_author_username": "semgrepuser",
"pull_request_author_image_url": "",
"pull_request_id": "3483",
"pull_request_title": "test bad commit",
"ignored_files": ["/server/semgrep_app/templates/"],
"id": "xnkPGY8VL20o"


Deprecation notice

Creating Jira tickets from Findings page has been deprecated. This feature may be reenabled in the future.

Jira integration is a feature available in Semgrep's Team tier and above.

This integration allows you to create Jira tickets directly from the Findings page with relevant information about a particular finding.

To set up Jira integration:

  1. Sign in to your Semgrep Cloud Platform account, and then go to Settings > Integrations..
    1. On the Integrations page, click Add Integration (or Setup First Integration if this is your first integration), and then select Jira.
  2. Enter a Name of the integration.
  3. Enter the email address used for the Atlassian account.
  4. Enter your Atlassian domain URL.
  5. Enter your Project key. This is the prefix for tasks created within a project. Semgrep creates issues to the project identified here.
  6. Enter the Issue type. This is the type of issue for Semgrep findings, for example, Bug.
  7. Enter the API Token.
    • Generate the API token by following instructions in the Create an API token section in the following documentation: Manage API Tokens.
    • Find existing API tokens in the API Tokens page.
  8. Click Save.

Notification and alert de-duplication

Notifications are sent only the first time a given finding is detected.

Because of Semgrep CI's diff-awareness, you will not be notified when a pull request has a finding that existed on the base branch already, even if that line is moved or re-indented.

Semgrep Cloud Platform also keeps track of notifications that have already been sent, so consecutive scans of the same changes in the same pull request won't send duplicate notifications.

Find what you needed in this doc? Join the Semgrep Community Slack group to ask the maintainers and the community if you need help.