You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/deployment/core-deployment.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,7 +82,7 @@ These are the absolute minimum Semgrep features for any deployment.
82
82
<td>Semgrep fully supports many popular CI providers. See <a href="/docs/deployment/add-semgrep-to-ci"><i class="fa-regular fa-file-lines"></i> Add Semgrep to CI</a>.</td>
83
83
</tr>
84
84
<tr>
85
-
<td>Managed scanning: scanning remote repositories in bulk without CI changes</td>
85
+
<td>Managed Scans: scanning remote repositories in bulk without CI changes</td>
86
86
<td>An alternative method of scanning many repositories with Semgrep that doesn't require integration with your CI. Requires read access to user-selected repositories. See <a href="/docs/deployment/managed-scanning/overview"><i class="fa-regular fa-file-lines"></i> Add repositories to Semgrep in bulk</a>.</td>
Copy file name to clipboardExpand all lines: docs/deployment/deployment-checklist.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -253,7 +253,7 @@ The public GitHub integration app is called [`semgrep-app`](https://github.com/a
253
253
</details>
254
254
255
255
256
-
##### Permissions when adding repositories into Semgrep AppSec Platform through managed scanning or using AI features
256
+
##### Permissions when adding repositories into Semgrep AppSec Platform through Semgrep Managed Scans or using AI features
257
257
258
258
You can optionally create a private GitHub app, which follows the naming convention **Semgrep Code - <spanclassName="placeholder">YOUR_ORG_NAME</span>**. This private app is used for the following features:
259
259
@@ -266,7 +266,7 @@ These features require **read access** to your code.
266
266
267
267
<details>
268
268
269
-
<summary>Click to review how Semgrep AppSec Platform uses permissions when adding repositories through <strong>managed scanning</strong>.</summary>
269
+
<summary>Click to review how Semgrep AppSec Platform uses permissions when adding repositories through <strong>Semgrep Managed Scans</strong>.</summary>
270
270
271
271
<dl>
272
272
<dt>Reading metadata of the repositories you select</dt>
Copy file name to clipboardExpand all lines: docs/deployment/managed-scanning/azure.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,10 +20,10 @@ Add Azure DevOps repositories to your Semgrep organization in bulk without addin
20
20
21
21
## Prerequisites and permissions
22
22
23
-
- Semgrep Managed Scanning requires repositories hosted by Azure DevOps Services. It doesn't support Azure DevOps Server.
24
-
- Semgrep recommends setting up and configuring Semgrep Managed Scanning with an Azure DevOps service account, not a personal account. Regardless of whether you use a personal or service account, the account must be assigned the **Owner** or **Project Collection Administrator** role for the organization.
23
+
- Semgrep Managed Scans require repositories hosted by Azure DevOps Services. Azure DevOps Server is not supported.
24
+
- Semgrep recommends setting up and configuring Semgrep Managed Scans with an Azure DevOps service account, not a personal account. Regardless of whether you use a personal or service account, the account must be assigned the **Owner** or **Project Collection Administrator** role for the organization.
25
25
- During setup and configuration, you must provide a personal access token generated by the account. This token must be authorized with **Full access**.
26
-
- Once you have Managed Scanning fully configured, you can update the token provided to Semgrep to one that's more restrictive. The scopes you must assign to the token include:
26
+
- Once you have Managed Scans fully configured, you can add restrictions to the token provided to Semgrep. The scopes you must assign to the token include:
27
27
-`Code: Read`
28
28
-`Code: Status`
29
29
-`Member Entitlement Management: Read`
@@ -50,7 +50,7 @@ You have finished setting up a Semgrep managed scan. Click **Back to Managed Sca
50
50
51
51
## Add additional Azure DevOps projects
52
52
53
-
You can enable managed scanning for additional repositories after onboarding using the following steps:
53
+
You can enable Semgrep Managed Scans for additional repositories after onboarding using the following steps:
54
54
55
55
<!-- vale off -->
56
56
1. In Semgrep AppSec Platform, click **<iclass="fa-solid fa-folder-open"></i> Projects**.
@@ -89,7 +89,7 @@ Semgrep preserves your findings, scans, and triage history.
89
89
90
90
## Disable webhooks
91
91
92
-
Managed scanning of Azure DevOps projects requires webhooks. The webhooks are enabled by default when you add Azure DevOps as a source code manager when setting up Managed Scanning. Webhooks are required for diff-aware scans and triaging by PR or MR comments.
92
+
Managed Scans of Azure DevOps projects require webhooks. The webhooks are enabled by default when you add Azure DevOps as a source code manager when setting up Managed Scans. Webhooks are required for diff-aware scans and triaging by PR or MR comments.
93
93
94
94
You can turn off webhooks at any time by following these steps:
95
95
@@ -140,7 +140,7 @@ See [Configure a branch policy for an external service](https://learn.microsoft.
140
140
141
141
## Troubleshooting: multiple projects
142
142
143
-
If you currently scan Azure DevOps repositories in your CI pipeline, you may see findings assigned to two separate projects once you enable Semgrep Managed Scanning. For example, findings from Managed Scanning go to the `semgrep/frontend/webpage` project, while findings from CI scans go to the `frontend/webpage` project. If this is the case, Semgrep AppSec Platform flags these findings with **Possible duplicate**. Please [contact support](/support) for addition assistance.
143
+
If you currently scan Azure DevOps repositories in your CI pipeline, you may see findings assigned to two separate projects once you enable Semgrep Managed Scans. For example, findings from Managed Scans go to the `semgrep/frontend/webpage` project, while findings from CI scans go to the `frontend/webpage` project. If this is the case, Semgrep AppSec Platform flags these findings with **Possible duplicate**. Please [contact support](/support) for addition assistance.
Copy file name to clipboardExpand all lines: docs/deployment/managed-scanning/bitbucket.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,14 +19,14 @@ Add Bitbucket repositories to your Semgrep organization in bulk without adding o
19
19
20
20
## Prerequisites and permissions
21
21
22
-
Semgrep Managed Scanning requires one of the following plans:
22
+
Semgrep Managed Scans require one of the following plans:
23
23
24
24
- Bitbucket Cloud Premium
25
25
- Bitbucket Data Center (v8.8 or above for diff-aware scans)
26
26
27
27
### Bitbucket Cloud
28
28
29
-
You must provide a Bitbucket [workspace access token](https://support.atlassian.com/bitbucket-cloud/docs/workspace-access-tokens/) to Semgrep, which can be created by a user with the `Product Admin` role. Once you have Managed Scanning fully configured, you can update the token provided to Semgrep to one that's more restrictive. The scopes you must assign to the token include:
29
+
You must provide a Bitbucket [workspace access token](https://support.atlassian.com/bitbucket-cloud/docs/workspace-access-tokens/) to Semgrep, which can be created by a user with the `Product Admin` role. Once you have Semgrep Managed Scans fully configured, you can update the token provided to Semgrep to one that's more restrictive. The scopes you must assign to the token include:
30
30
31
31
-`webhook (read and write)`
32
32
-`repository (read and write)`
@@ -38,11 +38,11 @@ Webhook permissions are required to support diff-aware scans.
38
38
39
39
### Bitbucket Data Center
40
40
41
-
You must provide a Bitbucket [HTTP access token](https://confluence.atlassian.com/bitbucketserver/http-access-tokens-939515499.html) to Semgrep, which can be created by a user with the `Project Admin` role. This access token must be created with with `PROJECT_ADMIN` permissions.
41
+
You must provide a Bitbucket [HTTP access token](https://confluence.atlassian.com/bitbucketserver/http-access-tokens-939515499.html) to Semgrep, which can be created by a user with the `Project Admin` role. This access token must be created with `PROJECT_ADMIN` permissions.
42
42
43
43
Project-level webhooks are required to support diff-aware scans.
44
44
45
-
## Enable Managed Scanning and scan your first repository
45
+
## Enable Semgrep Managed Scans and scan your first repository
46
46
47
47
<!-- vale off -->
48
48
1. In Semgrep AppSec Platform, click **<iclass="fa-solid fa-folder-open"></i> Projects**.
@@ -92,7 +92,7 @@ You can enable Managed Scans for additional repositories after onboarding using
92
92
93
93
You can immediately add any existing project to Managed Scans.
94
94
95
-
1. Follow the steps in [Enable managed scanning](#enable-managed-scanning-and-scan-your-first-repository).
95
+
1. Follow the steps in [Enable Semgrep Managed Scans](#enable-managed-scanning-and-scan-your-first-repository).
96
96
1. Delete the `bitbucket-pipelines.yml` file in your Bitbucket repository if appropriate.
97
97
98
98
If you plan to continue running some scans in Bitbucket CI/CD Pipelines (for example, using Managed Scans to run weekly full scans but Bitbucket CI/CD Pipelines for diff-aware scans) you can leave the workflow file in place, and edit it to reflect your desired configuration.
@@ -107,7 +107,7 @@ Semgrep preserves your findings, scans, and triage history.
107
107
108
108
## Disable webhooks
109
109
110
-
Performing diff-aware Managed Scans of Bitbucket projects requires webhooks to be enabled. Webhooks are enabled by default when you add Bitbucket as a source code manager when setting up Managed Scanning. You can disable webhooks at any time by following these steps:
110
+
Performing diff-aware Managed Scans of Bitbucket projects requires webhooks to be enabled. Webhooks are enabled by default when you add Bitbucket as a source code manager when setting up Semgrep Managed Scans. You can disable webhooks at any time by following these steps:
111
111
112
112
1. In Semgrep AppSec Platform, go to [Settings > Source code managers](https://semgrep.dev/orgs/-/settings/source-code).
113
113
2. Find your Bitbucket connection, and click the <iclass="fa-solid fa-toggle-large-on"></i> toggle to disable **Incoming webhooks**.
Copy file name to clipboardExpand all lines: docs/deployment/managed-scanning/gitlab.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ Add GitLab repositories to your Semgrep organization in bulk without adding or c
24
24
25
25
See [Pre-deployment checklist > Permissions](/deployment/checklist#permissions) for more information about the permissions used by Semgrep.
26
26
27
-
## Enable Managed Scanning and scan your first repository
27
+
## Enable Semgrep Managed Scans and scan your first repository
28
28
29
29
<!-- vale off -->
30
30
1. In Semgrep AppSec Platform, click **<iclass="fa-solid fa-folder-open"></i> Projects**.
@@ -50,7 +50,7 @@ You have finished setting up a Semgrep managed scan.
50
50
51
51
## Add additional GitLab projects
52
52
53
-
You can enabled managed scanning for additional repositories after onboarding using the following steps:
53
+
You can enable Semgrep Managed Scans for additional repositories after onboarding using the following steps:
54
54
55
55
<!-- vale off -->
56
56
1. In Semgrep AppSec Platform, click **<iclass="fa-solid fa-folder-open"></i> Projects**.
@@ -77,7 +77,7 @@ You can enabled managed scanning for additional repositories after onboarding us
77
77
78
78
You can immediately add any existing project to Managed Scans.
79
79
80
-
1. Follow the steps in [Enable managed scanning](#enable-managed-scanning-and-scan-your-first-repository).
80
+
1. Follow the steps in [Enable Semgrep Managed Scans](#enable-managed-scanning-and-scan-your-first-repository).
81
81
1. Delete the `.gitlab-ci.yml` file in your GitLab repository if appropriate.
82
82
83
83
If you plan to continue running some scans in GitLab CI/CD Pipelines (for example, using Managed Scans to run weekly full scans but GitLab CI/CD Pipelines for diff-aware scans) you can leave the workflow file in place, and edit it to reflect your desired configuration.
@@ -92,7 +92,7 @@ Semgrep preserves your findings, scans, and triage history.
92
92
93
93
## Disable webhooks
94
94
95
-
Managed scanning of GitLab projects require webhooks. The webhooks are enabled by default when you add GitLab as a source code manager when setting up Managed Scanning. You can disable webhooks at any time by following these steps:
95
+
Semgrep Managed Scans of GitLab projects require webhooks. The webhooks are enabled by default when you add GitLab as a source code manager when setting up Managed Scans. You can disable webhooks at any time by following these steps:
96
96
97
97
1. In Semgrep AppSec Platform, go to [Settings > Source code managers](https://semgrep.dev/orgs/-/settings/source-code).
98
98
2. Find your GitLab connection, and click the <iclass="fa-solid fa-toggle-large-on"></i> toggle to disable **Incoming webhooks**.
Copy file name to clipboardExpand all lines: docs/getting-started/introduction.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ Scan results can be triaged and remediated in the Semgrep AppSec Platform. The p
23
23
24
24
***Community Edition** (CE): is an open source static analysis tool that can find insecure coding patterns and security vulnerabilities in source code. Semgrep CE encompasses a SAST scanning engine, community rules, and integrated development environment plugins. The core scanner supports over 30 programming languages. [Get started with CE](/docs/getting-started/quickstart-ce).
25
25
26
-
***Semgrep AppSec Platform** (Pro): is a commercial offering recommended for enterprise use cases. It shares the command-line interface with CE and adds additional capabilities. Semgrep AppSec Platform Pro offers managed scanning at org scale, advanced (pro) rules, supply chain analysis, secrets detection, PR comments, and AI-assisted triage/fixes, and more. It supports over 35 programming languages, with new ones added regularly.
26
+
***Semgrep AppSec Platform** (Pro): is a commercial offering recommended for enterprise use cases. It shares the command-line interface with CE and adds additional capabilities. Semgrep AppSec Platform Pro offers Managed Scans at org scale, advanced (pro) rules, supply chain analysis, secrets detection, PR comments, and AI-assisted triage/fixes, and more. It supports over 35 programming languages, with new ones added regularly.
Copy file name to clipboardExpand all lines: docs/getting-started/quickstart-sms.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,7 +48,7 @@ You must have admin access to your Azure DevOps organization.
48
48
49
49
Read access is granted through an access token you generate on Azure DevOps. You can provide this token by [adding Azure DevOps as a source code manager](/deployment/connect-scm#connect-to-cloud-hosted-orgs).
50
50
51
-
Semgrep recommends setting up and configuring Semgrep with an Azure DevOps service account, not a personal account. Regardless of whether you use a personal or service account, the account must be assigned the **Owner** or **Project Collection Administrator** role for the organization. During setup and configuration, you must provide a personal access token generated by this account. This token must be authorized with **Full access**. Once you have Managed Scanning fully configured, you can update the token provided to Semgrep to one that's more restrictive. The scopes you must assign to the token include:
51
+
Semgrep recommends setting up and configuring Semgrep with an Azure DevOps service account, not a personal account. Regardless of whether you use a personal or service account, the account must be assigned the **Owner** or **Project Collection Administrator** role for the organization. During setup and configuration, you must provide a personal access token generated by this account. This token must be authorized with **Full access**. Once you have Semgrep Managed Scans fully configured, you can update the token provided to Semgrep to one that's more restrictive. The scopes you must assign to the token include:
Copy file name to clipboardExpand all lines: docs/index.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -131,7 +131,7 @@ See the [Supported languages](/supported-languages#language-maturity-summary) do
131
131
<h3>October 2025 release notes summary</h3>
132
132
<!-- 5-7 bullets across the product suite -->
133
133
134
-
- Semgrep Managed Scanning is now generally available. With Managed Scans, you can add repositories to your Semgrep organization in bulk without changing your existing CI workflows, and integrate Semgrep into developer workflows through PR or MR comments.
134
+
- Semgrep Managed Scans are now generally available. With Managed Scans, you can add repositories to your Semgrep organization in bulk without changing your existing CI workflows, and integrate Semgrep into developer workflows through PR or MR comments.
135
135
- Semgrep Code findings now show Assistant's true or false positive analyses more prominently, along with the memories Assistant used during analysis. The findings also present the threat model for specific security issues in the context of the code, along with a summary of each issue.
136
136
- The `/setup_semgrep_mcp` command now supports Claude Code.
137
137
- Supply Chain's reachability analysis now covers all high-severity CVEs from supported sources starting from 2017 for Go packages.
Copy file name to clipboardExpand all lines: docs/semgrep-supply-chain/getting-started.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -107,7 +107,7 @@ Semgrep Supply Chain can scan projects without the need for lockfiles. This simp
107
107
Semgrep builds the project, using the build information included in the `pom.xml` or `build.gradle` file to determine the set of dependencies used by the project.
108
108
109
109
:::info
110
-
- Semgrep Managed Scanning can't determine the dependencies in a project when there is no manifest file or lockfile, so Supply Chain scans don't return any findings.
110
+
- Semgrep Managed Scans can't determine the dependencies in a project when there is no manifest file or lockfile, so Supply Chain scans don't return any findings.
111
111
- By default, Semgrep doesn't surface errors generated during a scan. To view errors in the CLI output, include the `--verbose` when initiating your scan:
0 commit comments