Skip to content

Commit 80f0e2f

Browse files
abhijnaAbhijna Parigi
andauthored
managed scanning to scans (#2415)
Co-authored-by: Abhijna Parigi <Abhijna@MacBook-Pro.local>
1 parent ab12727 commit 80f0e2f

File tree

10 files changed

+24
-24
lines changed

10 files changed

+24
-24
lines changed

docs/deployment/connect-scm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -208,7 +208,7 @@ You have successfully connected an org in Semgrep AppSec Platform with an organi
208208
1. Click **Connect** to save and proceed.
209209
1. The Bitbucket project is now listed under **Source code managers**. Click **Test** to verify that the new connection was installed correctly.
210210
1. To enable merge request comments, click **<i class="fa-solid fa-toggle-large-on"></i> Incoming webhooks**.
211-
1. Optional: Click **Auto scan** to onboard all current and future repositories under your project to Semgrep Managed Scanning.
211+
1. Optional: Click **Auto scan** to onboard all current and future repositories under your project to Semgrep Managed Scans.
212212

213213
</TabItem>
214214
<TabItem value='github-enterprise'>

docs/deployment/core-deployment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ These are the absolute minimum Semgrep features for any deployment.
8282
<td>Semgrep fully supports many popular CI providers. See <a href="/docs/deployment/add-semgrep-to-ci"><i class="fa-regular fa-file-lines"></i> Add Semgrep to CI</a>.</td>
8383
</tr>
8484
<tr>
85-
<td>Managed scanning: scanning remote repositories in bulk without CI changes</td>
85+
<td>Managed Scans: scanning remote repositories in bulk without CI changes</td>
8686
<td>An alternative method of scanning many repositories with Semgrep that doesn't require integration with your CI. Requires read access to user-selected repositories. See <a href="/docs/deployment/managed-scanning/overview"><i class="fa-regular fa-file-lines"></i> Add repositories to Semgrep in bulk</a>.</td>
8787
</tr>
8888
<tr>

docs/deployment/deployment-checklist.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -253,7 +253,7 @@ The public GitHub integration app is called [`semgrep-app`](https://github.com/a
253253
</details>
254254

255255

256-
##### Permissions when adding repositories into Semgrep AppSec Platform through managed scanning or using AI features
256+
##### Permissions when adding repositories into Semgrep AppSec Platform through Semgrep Managed Scans or using AI features
257257

258258
You can optionally create a private GitHub app, which follows the naming convention **Semgrep Code - <span className="placeholder">YOUR_ORG_NAME</span>**. This private app is used for the following features:
259259

@@ -266,7 +266,7 @@ These features require **read access** to your code.
266266

267267
<details>
268268

269-
<summary>Click to review how Semgrep AppSec Platform uses permissions when adding repositories through <strong>managed scanning</strong>.</summary>
269+
<summary>Click to review how Semgrep AppSec Platform uses permissions when adding repositories through <strong>Semgrep Managed Scans</strong>.</summary>
270270

271271
<dl>
272272
<dt>Reading metadata of the repositories you select</dt>

docs/deployment/managed-scanning/azure.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,10 @@ Add Azure DevOps repositories to your Semgrep organization in bulk without addin
2020

2121
## Prerequisites and permissions
2222

23-
- Semgrep Managed Scanning requires repositories hosted by Azure DevOps Services. It doesn't support Azure DevOps Server.
24-
- Semgrep recommends setting up and configuring Semgrep Managed Scanning with an Azure DevOps service account, not a personal account. Regardless of whether you use a personal or service account, the account must be assigned the **Owner** or **Project Collection Administrator** role for the organization.
23+
- Semgrep Managed Scans require repositories hosted by Azure DevOps Services. Azure DevOps Server is not supported.
24+
- Semgrep recommends setting up and configuring Semgrep Managed Scans with an Azure DevOps service account, not a personal account. Regardless of whether you use a personal or service account, the account must be assigned the **Owner** or **Project Collection Administrator** role for the organization.
2525
- During setup and configuration, you must provide a personal access token generated by the account. This token must be authorized with **Full access**.
26-
- Once you have Managed Scanning fully configured, you can update the token provided to Semgrep to one that's more restrictive. The scopes you must assign to the token include:
26+
- Once you have Managed Scans fully configured, you can add restrictions to the token provided to Semgrep. The scopes you must assign to the token include:
2727
- `Code: Read`
2828
- `Code: Status`
2929
- `Member Entitlement Management: Read`
@@ -50,7 +50,7 @@ You have finished setting up a Semgrep managed scan. Click **Back to Managed Sca
5050

5151
## Add additional Azure DevOps projects
5252

53-
You can enable managed scanning for additional repositories after onboarding using the following steps:
53+
You can enable Semgrep Managed Scans for additional repositories after onboarding using the following steps:
5454

5555
<!-- vale off -->
5656
1. In Semgrep AppSec Platform, click **<i class="fa-solid fa-folder-open"></i> Projects**.
@@ -89,7 +89,7 @@ Semgrep preserves your findings, scans, and triage history.
8989

9090
## Disable webhooks
9191

92-
Managed scanning of Azure DevOps projects requires webhooks. The webhooks are enabled by default when you add Azure DevOps as a source code manager when setting up Managed Scanning. Webhooks are required for diff-aware scans and triaging by PR or MR comments.
92+
Managed Scans of Azure DevOps projects require webhooks. The webhooks are enabled by default when you add Azure DevOps as a source code manager when setting up Managed Scans. Webhooks are required for diff-aware scans and triaging by PR or MR comments.
9393

9494
You can turn off webhooks at any time by following these steps:
9595

@@ -140,7 +140,7 @@ See [Configure a branch policy for an external service](https://learn.microsoft.
140140

141141
## Troubleshooting: multiple projects
142142

143-
If you currently scan Azure DevOps repositories in your CI pipeline, you may see findings assigned to two separate projects once you enable Semgrep Managed Scanning. For example, findings from Managed Scanning go to the `semgrep/frontend/webpage` project, while findings from CI scans go to the `frontend/webpage` project. If this is the case, Semgrep AppSec Platform flags these findings with **Possible duplicate**. Please [contact support](/support) for addition assistance.
143+
If you currently scan Azure DevOps repositories in your CI pipeline, you may see findings assigned to two separate projects once you enable Semgrep Managed Scans. For example, findings from Managed Scans go to the `semgrep/frontend/webpage` project, while findings from CI scans go to the `frontend/webpage` project. If this is the case, Semgrep AppSec Platform flags these findings with **Possible duplicate**. Please [contact support](/support) for addition assistance.
144144

145145
## Appendices
146146

docs/deployment/managed-scanning/bitbucket.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -19,14 +19,14 @@ Add Bitbucket repositories to your Semgrep organization in bulk without adding o
1919

2020
## Prerequisites and permissions
2121

22-
Semgrep Managed Scanning requires one of the following plans:
22+
Semgrep Managed Scans require one of the following plans:
2323

2424
- Bitbucket Cloud Premium
2525
- Bitbucket Data Center (v8.8 or above for diff-aware scans)
2626

2727
### Bitbucket Cloud
2828

29-
You must provide a Bitbucket [workspace access token](https://support.atlassian.com/bitbucket-cloud/docs/workspace-access-tokens/) to Semgrep, which can be created by a user with the `Product Admin` role. Once you have Managed Scanning fully configured, you can update the token provided to Semgrep to one that's more restrictive. The scopes you must assign to the token include:
29+
You must provide a Bitbucket [workspace access token](https://support.atlassian.com/bitbucket-cloud/docs/workspace-access-tokens/) to Semgrep, which can be created by a user with the `Product Admin` role. Once you have Semgrep Managed Scans fully configured, you can update the token provided to Semgrep to one that's more restrictive. The scopes you must assign to the token include:
3030

3131
- `webhook (read and write)`
3232
- `repository (read and write)`
@@ -38,11 +38,11 @@ Webhook permissions are required to support diff-aware scans.
3838

3939
### Bitbucket Data Center
4040

41-
You must provide a Bitbucket [HTTP access token](https://confluence.atlassian.com/bitbucketserver/http-access-tokens-939515499.html) to Semgrep, which can be created by a user with the `Project Admin` role. This access token must be created with with `PROJECT_ADMIN` permissions.
41+
You must provide a Bitbucket [HTTP access token](https://confluence.atlassian.com/bitbucketserver/http-access-tokens-939515499.html) to Semgrep, which can be created by a user with the `Project Admin` role. This access token must be created with `PROJECT_ADMIN` permissions.
4242

4343
Project-level webhooks are required to support diff-aware scans.
4444

45-
## Enable Managed Scanning and scan your first repository
45+
## Enable Semgrep Managed Scans and scan your first repository
4646

4747
<!-- vale off -->
4848
1. In Semgrep AppSec Platform, click **<i class="fa-solid fa-folder-open"></i> Projects**.
@@ -92,7 +92,7 @@ You can enable Managed Scans for additional repositories after onboarding using
9292

9393
You can immediately add any existing project to Managed Scans.
9494

95-
1. Follow the steps in [Enable managed scanning](#enable-managed-scanning-and-scan-your-first-repository).
95+
1. Follow the steps in [Enable Semgrep Managed Scans](#enable-managed-scanning-and-scan-your-first-repository).
9696
1. Delete the `bitbucket-pipelines.yml` file in your Bitbucket repository if appropriate.
9797

9898
If you plan to continue running some scans in Bitbucket CI/CD Pipelines (for example, using Managed Scans to run weekly full scans but Bitbucket CI/CD Pipelines for diff-aware scans) you can leave the workflow file in place, and edit it to reflect your desired configuration.
@@ -107,7 +107,7 @@ Semgrep preserves your findings, scans, and triage history.
107107

108108
## Disable webhooks
109109

110-
Performing diff-aware Managed Scans of Bitbucket projects requires webhooks to be enabled. Webhooks are enabled by default when you add Bitbucket as a source code manager when setting up Managed Scanning. You can disable webhooks at any time by following these steps:
110+
Performing diff-aware Managed Scans of Bitbucket projects requires webhooks to be enabled. Webhooks are enabled by default when you add Bitbucket as a source code manager when setting up Semgrep Managed Scans. You can disable webhooks at any time by following these steps:
111111

112112
1. In Semgrep AppSec Platform, go to [Settings > Source code managers](https://semgrep.dev/orgs/-/settings/source-code).
113113
2. Find your Bitbucket connection, and click the <i class="fa-solid fa-toggle-large-on"></i> toggle to disable **Incoming webhooks**.

docs/deployment/managed-scanning/gitlab.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Add GitLab repositories to your Semgrep organization in bulk without adding or c
2424

2525
See [Pre-deployment checklist > Permissions](/deployment/checklist#permissions) for more information about the permissions used by Semgrep.
2626

27-
## Enable Managed Scanning and scan your first repository
27+
## Enable Semgrep Managed Scans and scan your first repository
2828

2929
<!-- vale off -->
3030
1. In Semgrep AppSec Platform, click **<i class="fa-solid fa-folder-open"></i> Projects**.
@@ -50,7 +50,7 @@ You have finished setting up a Semgrep managed scan.
5050

5151
## Add additional GitLab projects
5252

53-
You can enabled managed scanning for additional repositories after onboarding using the following steps:
53+
You can enable Semgrep Managed Scans for additional repositories after onboarding using the following steps:
5454

5555
<!-- vale off -->
5656
1. In Semgrep AppSec Platform, click **<i class="fa-solid fa-folder-open"></i> Projects**.
@@ -77,7 +77,7 @@ You can enabled managed scanning for additional repositories after onboarding us
7777

7878
You can immediately add any existing project to Managed Scans.
7979

80-
1. Follow the steps in [Enable managed scanning](#enable-managed-scanning-and-scan-your-first-repository).
80+
1. Follow the steps in [Enable Semgrep Managed Scans](#enable-managed-scanning-and-scan-your-first-repository).
8181
1. Delete the `.gitlab-ci.yml` file in your GitLab repository if appropriate.
8282

8383
If you plan to continue running some scans in GitLab CI/CD Pipelines (for example, using Managed Scans to run weekly full scans but GitLab CI/CD Pipelines for diff-aware scans) you can leave the workflow file in place, and edit it to reflect your desired configuration.
@@ -92,7 +92,7 @@ Semgrep preserves your findings, scans, and triage history.
9292

9393
## Disable webhooks
9494

95-
Managed scanning of GitLab projects require webhooks. The webhooks are enabled by default when you add GitLab as a source code manager when setting up Managed Scanning. You can disable webhooks at any time by following these steps:
95+
Semgrep Managed Scans of GitLab projects require webhooks. The webhooks are enabled by default when you add GitLab as a source code manager when setting up Managed Scans. You can disable webhooks at any time by following these steps:
9696

9797
1. In Semgrep AppSec Platform, go to [Settings > Source code managers](https://semgrep.dev/orgs/-/settings/source-code).
9898
2. Find your GitLab connection, and click the <i class="fa-solid fa-toggle-large-on"></i> toggle to disable **Incoming webhooks**.

docs/getting-started/introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Scan results can be triaged and remediated in the Semgrep AppSec Platform. The p
2323

2424
* **Community Edition** (CE): is an open source static analysis tool that can find insecure coding patterns and security vulnerabilities in source code. Semgrep CE encompasses a SAST scanning engine, community rules, and integrated development environment plugins. The core scanner supports over 30 programming languages. [Get started with CE](/docs/getting-started/quickstart-ce).
2525

26-
* **Semgrep AppSec Platform** (Pro): is a commercial offering recommended for enterprise use cases. It shares the command-line interface with CE and adds additional capabilities. Semgrep AppSec Platform Pro offers managed scanning at org scale, advanced (pro) rules, supply chain analysis, secrets detection, PR comments, and AI-assisted triage/fixes, and more. It supports over 35 programming languages, with new ones added regularly.
26+
* **Semgrep AppSec Platform** (Pro): is a commercial offering recommended for enterprise use cases. It shares the command-line interface with CE and adds additional capabilities. Semgrep AppSec Platform Pro offers Managed Scans at org scale, advanced (pro) rules, supply chain analysis, secrets detection, PR comments, and AI-assisted triage/fixes, and more. It supports over 35 programming languages, with new ones added regularly.
2727

2828
![](/img/appsecplatform-intro.png)
2929

docs/getting-started/quickstart-sms.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ You must have admin access to your Azure DevOps organization.
4848

4949
Read access is granted through an access token you generate on Azure DevOps. You can provide this token by [adding Azure DevOps as a source code manager](/deployment/connect-scm#connect-to-cloud-hosted-orgs).
5050

51-
Semgrep recommends setting up and configuring Semgrep with an Azure DevOps service account, not a personal account. Regardless of whether you use a personal or service account, the account must be assigned the **Owner** or **Project Collection Administrator** role for the organization. During setup and configuration, you must provide a personal access token generated by this account. This token must be authorized with **Full access**. Once you have Managed Scanning fully configured, you can update the token provided to Semgrep to one that's more restrictive. The scopes you must assign to the token include:
51+
Semgrep recommends setting up and configuring Semgrep with an Azure DevOps service account, not a personal account. Regardless of whether you use a personal or service account, the account must be assigned the **Owner** or **Project Collection Administrator** role for the organization. During setup and configuration, you must provide a personal access token generated by this account. This token must be authorized with **Full access**. Once you have Semgrep Managed Scans fully configured, you can update the token provided to Semgrep to one that's more restrictive. The scopes you must assign to the token include:
5252

5353
- `Code: Read`
5454
- `Code: Status`

docs/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -131,7 +131,7 @@ See the [Supported languages](/supported-languages#language-maturity-summary) do
131131
<h3>October 2025 release notes summary</h3>
132132
<!-- 5-7 bullets across the product suite -->
133133

134-
- Semgrep Managed Scanning is now generally available. With Managed Scans, you can add repositories to your Semgrep organization in bulk without changing your existing CI workflows, and integrate Semgrep into developer workflows through PR or MR comments.
134+
- Semgrep Managed Scans are now generally available. With Managed Scans, you can add repositories to your Semgrep organization in bulk without changing your existing CI workflows, and integrate Semgrep into developer workflows through PR or MR comments.
135135
- Semgrep Code findings now show Assistant's true or false positive analyses more prominently, along with the memories Assistant used during analysis. The findings also present the threat model for specific security issues in the context of the code, along with a summary of each issue.
136136
- The `/setup_semgrep_mcp` command now supports Claude Code.
137137
- Supply Chain's reachability analysis now covers all high-severity CVEs from supported sources starting from 2017 for Go packages.

docs/semgrep-supply-chain/getting-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ Semgrep Supply Chain can scan projects without the need for lockfiles. This simp
107107
Semgrep builds the project, using the build information included in the `pom.xml` or `build.gradle` file to determine the set of dependencies used by the project.
108108

109109
:::info
110-
- Semgrep Managed Scanning can't determine the dependencies in a project when there is no manifest file or lockfile, so Supply Chain scans don't return any findings.
110+
- Semgrep Managed Scans can't determine the dependencies in a project when there is no manifest file or lockfile, so Supply Chain scans don't return any findings.
111111
- By default, Semgrep doesn't surface errors generated during a scan. To view errors in the CLI output, include the `--verbose` when initiating your scan:
112112
```console
113113
semgrep ci --allow-local-builds --verbose

0 commit comments

Comments
 (0)