Skip to main content

Static analysis and rule-writing glossary

The definitions provided here are specific to Semgrep.

Constant propagationโ€‹

Constant propagation is a type of analysis where values known to be constant are substituted in later uses, allowing the value to be used to detect matches. Semgrep can perform constant propagation across files, unless you are running Semgrep OSS, which can only propagate within a file.

Constant propagation is applied to all rules unless it is disabled.

For example, given the following pattern:

...
patterns:
- pattern: console.log(2)

And the following code snippet:

const x = 2;
console.log(x);

The pattern operator pattern: print(2) tells Semgrep to match line 2 because it propagates the value 2 from the assignment in line 1 to the console.log() function in line.

Constant propagation is one of the many analyses that differentiate Semgrep from grep.

Cross-file analysisโ€‹

Cross-file analysis (also known as interfile analysis) takes into account how information flows between files. In particular, cross-file analysis includes cross-file taint analysis, which tracks unsanitized variables flowing from a source to a sink through arbitrarily many files. Other analyses performed across files include constant propagation and type inference.

Cross-file analysis is usually used in contrast to intrafile, or per-file analysis, where each file is analyzed as a standalone block of code.

Within Semgrep, cross-file and cross-function analysis is simply referred to as cross-file analysis.

Semgrep OSS is limited to per-file analysis.

Cross-function analysisโ€‹

Cross-function analysis means that interactions between functions are taken into account. This improves taint analysis, which tracks unsanitized variables flowing from a source to a sink through arbitrarily many functions.

Within Semgrep documentation, cross-function analysis implies intrafile or per-file analysis. Each file is still analyzed as a standalone block, but within the file it takes into account how information flows between functions.

Also known as interprocedural analysis.

Error matrixโ€‹

An error matrix is a 2x2 table that visualizes the findings of a Semgrep rule in relation to the vulnerable lines of code it does or doesn't detect. It has two axes:

  • Positive and negative
  • True or false

These yield the following combinations:

True positive
The rule detected a piece of code it was intended to find.
False positive
The rule detected a piece of code it was not intended to find.
True negative
The rule correctly skipped over a piece of code it wasn't meant to find.
False negative
The rule failed to detect a piece of code it should have found.

Not to be confused with risk matrices.

Findingโ€‹

A finding is the core result of Semgrep's analysis. Findings are generated when a Semgrep rule matches a piece of code. Findings can be security issues, bugs, or code that doesn't follow coding conventions.

Fully qualified nameโ€‹

A fully qualified name refers to a name which uniquely identifies a class, method, type, or module. Languages such as C# and Ruby use :: to distinguish between fully qualified names and regular names.

Not to be confused with tokens.

l-value (left-, or location-value)โ€‹

An expression that denotes an object in memory; a memory location, something that you can use in the left-hand side (LHS) of an assignment. For example, x and array[2] are l-values, but 2+2 is not.

Metavariableโ€‹

A metavariable is an abstraction that lets you match something even when you don't know exactly what it is you want to match. It is similar to capture groups in regular expressions. All metavariables begin with a $ and can only contain uppercase characters, digits, and underscores.

Propagatorโ€‹

A propagator is any code that alters a piece of data as the data moves across the program. This includes functions, reassignments, and so on.

When you write rules that perform taint analysis, propagators are pieces of code that you specify through the pattern-propagator key as code that always passes tainted data. This is especially relevant when Semgrep performs intraprocedural taint analysis, as there is no way for Semgrep to infer which function calls propagate taint. Thus, explicitly listing propagators is the only way for Semgrep to know if tainted data could be passed within your function.

Rule (Semgrep rule)โ€‹

A rule is a specification of the patterns that Semgrep must match to the code to generate a finding. Rules are written in YAML. Without a rule, the engine has no instructions on how to match code.

Rules can be run on either Semgrep or its OSS Engine. Only proprietary Semgrep can perform interfile analysis.

There are two types of rules: search and taint.

Search rules

Rules default to this type. Search rules detect matches based on the patterns described by a rule. There are several semantic analyses that search rules perform, such as:

  • Interpreting syntactically different code as semantically equivalent
  • Constant propagation
  • Matching a fully qualified name to its reference in the code, even when not fully qualified
  • Type inference, particularly when using typed metavariables
Taint rules
Taint rules make use of Semgrep's taint analysis in addition to default search functionalities. Taint rules are able to specify sources, sinks, and propagators of data as well as sanitizers of that data. For more information, see Taint analysis documentation.

Sanitizersโ€‹

A sanitizer is any piece of code, such as a function or a cast, that can clean untrusted or tainted data. Data from untrusted sources, such as user inputs, may be tainted with unsafe characters. Sanitizers ensure that unsafe characters are removed or stripped from the input.

An example of a sanitizer is the DOMPurify.sanitize(dirty); function from the DOMPurify package in JavaScript.

Per-file analysisโ€‹

Also known as intrafile analysis. In per-file analysis, information can only be traced or tracked within a single file. It cannot be traced if it flows to another file.

Per-file analysis can include cross-function analysis, aka tracing the flow of information between functions. When discussing the capabilities of pro analysis, per-file analysis implies cross-function analysis.

Per-function analysisโ€‹

Also known as intraprocedural analysis. In per-function analysis, information can only be traced or tracked within a single function.

Sinkโ€‹

In taint analysis, a sink is any vulnerable function that is called with potentially tainted or unsafe data.

Sourceโ€‹

In taint analysis, a source is any piece of code that assigns or sets tainted data, typically user input.

Taint analysisโ€‹

Taint analysis tracks and traces the flow of untrusted or unsafe data. Data coming from sources such as user inputs could be unsafe and used as an attack vector if these inputs are not sanitized. Taint analysis provides a means of tracing that data as it moves through the program from untrusted sources to vulnerable functions.


Not finding what you need in this doc? Ask questions in our Community Slack group, or see Support for other ways to get help.