We use Semgrep OSS as a static analysis tool to analyze the code in the
sourcegraph/sourcegraph
, sourcegraph/jetbrains
and sourcegraph/cody
repository for security vulnerabilities and bad patterns. We have published playbook below separately to resolve issues, false positives.
Semgrep Developer playbook is well documented handling any situation that developer faces.
Any Semgrep issues should be visible to you via the output of the Semgrep OSS / Code Analysis
GitHub check and as Github Comments.
If the offending commit has to be landed as part of resolving an incident,
This rarely happens (less than 0.5%), but if it does, please follow the steps below:
main
or default branch. If not please rebase your branch.If you're not still clear on how to resolve an issue raised by Semgrep, please reach out to the Security team in #discuss-security.
Semgrep OSS SAST scan supports both Buildkite, Github Action. For detailed architecture (flow diagram) and deployment check the documentation here.