semgrep
$ brew install semgrepStatic analysis, security scanning, and code rules from the terminal.
- semgrep fits infra well, especially for static analysis, security scanning, and code rules from the terminal.
- It is the official CLI from Semgrep.
- Good for scripts and agents.
- Good fit for coding-agent workflows and repeatable scripts.
- Structured output is available for automation and parsing.
Semgrep guide
The official CLI from Semgrep. Static analysis, security scanning, and code rules from the terminal. Supports structured output — good for scripts and agents.
Open CLI packages the install path, verify step, and safe-start workflow so this tool can move from “interesting CLI” to something you can actually use. It also integrates with skills.sh so each CLI comes with the right companion skills, not just a binary and a docs link.
When to apply
- static analysis, security scanning, and code rules from the terminal.
- You want security scanning you can script with structured output.
- You need static analysis.
- You need security scanning.
- You need code rules.
Quick reference
brew install semgrepsemgrep --versionsemgrep scan --config autoOpen CLI × skills.sh
Open CLI integrates semgrep with the right skills.sh companions so you get the tool and the workflow together.
Security Best Practices
Verified pairingOpen CLI integrates semgrep with this skills.sh skill because it is the clearest fit for how semgrep is usually used. Add safer defaults when a CLI touches secrets, auth, or sensitive systems.
$ npx skills add https://github.com/supercent-io/skills-template --skill security-best-practicesUse semgrep together with the Security Best Practices skills.sh skill. Start with inspection or dry-run commands, summarize any risk, and ask before actions with side effects.
Why this tool
- semgrep fits infra well, especially for static analysis, security scanning, and code rules from the terminal.
- It is the official CLI from Semgrep.
- Good for scripts and agents.
Watch-outs
- Run the verify command first.
Example workflow
1. semgrep scan --config autoSafe start
Install semgrep.
Run `semgrep --version` first.
Start with `semgrep scan --config auto`.
Install the infra CLI and verify kubeconfig, Docker context, or cloud credentials.