Skip to main content
  • Semgrep Supply Chain
  • Semgrep OSS Engine
  • Team & Enterprise Tier

Supported languages

This document provides information about supported languages and language maturity definitions for the following products:

  • Semgrep Code
  • Semgrep OSS
  • Semgrep Supply Chain

Semgrep Code and OSSโ€‹

Semgrep OSS is a fast, lightweight program analysis tool that can help you detect security issues in your code. It makes use of Semgrep's LGPL 2.1 open-source engine.

Semgrep Code is a static application security testing SAST solution that uses both Semgrep OSS Engine and a proprietary Semgrep Pro engine. This engine can perform more complex code analyses, resulting in a higher true positive rate than Semgrep OSS.

Use either tool to scan local code or integrate it into your CI/CD pipeline to automate the continuous scanning of your repositories.

ProductAnalysis
Semgrep OSS
  • Single-function analysis
  • Single-file analysis
Semgrep Code
  • All analyses in the OSS Engine
  • Cross-file (interfile) analysis
  • Cross-function (interprocedural) analysis

Language maturity levelsโ€‹

Semgrep Code languages can be classified into four maturity levels:

  • Generally available (GA)
  • Beta
  • Experimental
  • Community supported*

*Community supported languages meet the parse rate and syntax requirements of Experimental languages. Users can still access community rules or write their own rules.

Their differences are outlined in the following table:

FeatureGABetaExperimentalCommunity supported
Parse Rate99%+95%+90%+
Number of rules10+5+0+. Query the Registry to see if any rules exist for your language.
Semgrep syntaxRegex, equivalence, deep expression operators, types and typing. All features supported in Beta.Complete metavariable support, metavariable equality. All features supported in Experimental.Syntax, ellipsis operator, basic metavariable functionality.
SupportHighest quality support by the Semgrep team. Reported issues are resolved promptly.Supported by the Semgrep team. Reported issues are fixed after GA languages.There are limitations to this language's functionality. Reported issues are tracked and prioritized with best effort.These languages are supported by the Semgrep community. While Semgrep may develop rules or engine updates for these languages, they are not prioritized.

Semgrep Code language supportโ€‹

Semgrep Code supports over 30 languages and counting! ๐Ÿš€

LanguageMaturity levelCross-function analysisCross-file analysis
CGAโœ…โœ…
C++GAโœ…โœ…
C#GAโœ…โœ…
GoGAโœ…โœ…
JavaGAโœ…โœ…
JavaScriptGAโœ…โœ…
KotlinGAโœ…โœ…
TypeScriptGAโœ…โœ…
RubyGAโœ…--
RustGAโœ…--
JSXGAโœ…--
PHPGAโœ…--
PythonGAโœ…--
ScalaGAโœ…--
GenericGA----
JSONGA----
TerraformGA----
ApexBetaโœ…--
ElixirBetaโœ…--
SwiftBeta----

The following languages are Experimental:

  • Bash
  • Cairo
  • Clojure
  • Dart
  • Dockerfile
  • Hack
  • HTML
  • Jsonnet
  • Julia
  • Lisp
  • Lua
  • Ocaml
  • R
  • Scheme
  • Solidity
  • YAML
  • XML

If you'd like to request a language not shown here, please create an issue on the Semgrep GitHub repo.

Semgrep OSS language supportโ€‹

All Semgrep OSS languages are community supported. Community supported languages meet the parse rate and syntax requirements of experimental languages in Semgrep Code. Semgrep OSS uses Semgrep's open source engine.

Community supported languages have varying levels of rule coverage - check the registry and filter out Pro rules to see the level of coverage for OSS.

Click to view Semgrep OSS languages.
  • Bash
  • C
  • C++
  • C#
  • Cairo
  • Clojure
  • Dart
  • Dockerfile
  • Generic
  • Go
  • Hack
  • HTML
  • Java
  • JavaScript
  • JSON
  • Jsonnet
  • Julia
  • Lisp
  • Lua
  • Kotlin
  • Ruby
  • Rust
  • JSX
  • Ocaml
  • PHP
  • Python
  • R
  • Scala
  • Scheme
  • Solidity
  • Swift
  • TypeScript
  • YAML
  • XML

More informationโ€‹

Visit the cheat sheet generation script and associated semgrep-core test files to learn more about each feature:

Visit the Semgrep public language dashboard to see the parse rates for each language

Semgrep Supply Chainโ€‹

Semgrep Supply Chain is a software composition analysis (SCA) tool that detects security vulnerabilities in your codebase introduced by open source dependencies. It can also:

  • Generate a software bill of materials (SBOM) that provides a complete inventory of your open source components
  • Query for information about your dependencies
  • Support the enforcement of your business' open source package licensing requirements

Semgrep Supply Chain parses lockfiles for dependencies, then scans your codebase for reachable findings based on the lockfiles. Some languages, such as Java, have several lockfiles, depending on your repository's package manager. For some languages, such as JavaScript and Python, a manifest file is also parsed to determine transitivity.

LanguageSupported package managersLockfileReachability support levelโ€กLicense detection supportTime period of reachability rule coverage for CVEs/GHSAs
C#NuGetpackages.lock.jsonGAโœ…Since May 2022
GoGo modules (go mod)go.modGAโœ…
JavaGradlegradle.lockfileGAโœ…
MavenMaven-generated dependency tree (See Setting up SSC scans for Apache Maven for instructions.)GAโœ…
JavaScript or TypeScriptnpm (Node.js)package-lock.jsonGAโœ…
Yarn, Yarn 2, Yarn 3yarn.lockGA--
pnpmpnpm-lock.yamlGA--
Pythonpiprequirements.txtโ€ โ€  (generated by e.g. pip freeze)GAโœ… (PyPI packages only)
pip-toolsrequirements.txtGA
PipenvPipfile.lockGA
Poetrypoetry.lockGA
RubyRubyGemsGemfile.lockGAโœ…
RustCargocargo.lockLockfile-onlyโœ”๏ธNot applicable due to reachability support level
DartPubpubspec.lockLockfile-only--
KotlinGradlegradle.lockfileLockfile-only--
MavenMaven-generated dependency tree (See Setting up SSC scans for Apache Maven for instructions.)Lockfile-only--
PHPComposercomposer.lockLockfile-only--
ScalaMavenMaven-generated dependency tree (See Setting up SSC scans for Apache Maven for instructions.)Lockfile-only--
SwiftSwiftPMSwift-generated Package.resolved file. (See Swift documentation for instructions.)Lockfile-only--

*Semgrep Supply Chain scans transitive dependencies for all supported languages but does not perform reachability analysis on transitive dependencies.
โ€กReachability support level refers to the level of support for reachability analysis for the language. At the minimum, Semgrep Supply Chain uses lockfile-only rules, which check a package's version against versions with known vulnerabilities.
โ€ โ€ Semgrep Supply Chain supports requirements.txt when it is used as a lockfile. This means that requirements.txt must be set to exact versions (pinned dependencies) and the file must be generated automatically.

info

Semgrep ingests CVE information and security advisories from sources such as Reviewed GitHub Security Advisories to ensure effective rule coverage. Semgrep processes new information at least once per day to:

  • Generate rules for new security advisories;
  • Update rules based on changes to existing security advisories.
Transitivity support

For more information on transitivity, see Transitive dependencies and reachability analysis.

Maturity levelsโ€‹

Semgrep Supply Chain has two maturity levels:

  • General Availability (GA)
  • Beta

Their differences are outlined in the following table:

FeatureGABeta
Number of reachability rules10+1+
Semgrep, Inc. rule-writing supportQuickly release new rules for all critical and high vulnerabilities based on the latest security advisories.No commitment for new rules based on the latest security advisories.
Semgrep OSS Engine language supportSemgrep OSS Engine support is GA.Semgrep OSS Engine support is at least Beta.
Feature and product maturity levels
  • The detailed specifications previously provided apply only to language support. Language maturity levels differ from feature and product maturity levels.
  • Semgrep features and products documented as experimental, beta, or GA generally follow the definitions in a Software release life cycle.

Not finding what you need in this doc? Ask questions in our Community Slack group, or see Support for other ways to get help.