Skip to content

Commit 2683195

Browse files
authored
Merge branch 'master' into doc-ai-instructions
2 parents a06ee91 + ef4a108 commit 2683195

8 files changed

Lines changed: 112 additions & 101 deletions

File tree

.github/styles/config/vocabularies/Codacy/accept.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,7 @@ monorepo
5757
namespace
5858
OAuth
5959
onboarding
60+
Opengrep
6061
PHP_CodeSniffer
6162
PHPUnit
6263
plaintext
@@ -75,7 +76,6 @@ sbt
7576
Scalameta
7677
Scalastyle
7778
SCSSLint
78-
Semgrep
7979
Serverless
8080
severities
8181
ShellCheck

docs/getting-started/supported-languages-and-tools.md

Lines changed: 58 additions & 58 deletions
Large diffs are not rendered by default.

docs/organizations/managing-security-and-risk.md

Lines changed: 37 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -369,33 +369,33 @@ Security and risk management supports checking the languages and infrastructure-
369369
<tr>
370370
<td>Apex</td>
371371
<td><a href="https://pmd.github.io/">PMD</a>,
372-
<a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a></td>
372+
<a href="https://github.com/opengrep/opengrep/">Opengrep</a></td>
373373
</tr>
374374
<tr>
375375
<td>AWS CloudFormation</td>
376376
<td><a href="https://github.com/bridgecrewio/checkov/">Checkov</a>,
377-
<a href="https://trivy.dev">Trivy</a> <a href="#yaml-only"><sup>2</sup></a></td>
377+
<a href="https://trivy.dev">Trivy</a> <a href="#yaml-only"><sup>1</sup></a></td>
378378
</tr>
379379
<tr>
380380
<td>C</td>
381-
<td><a href="https://clang.llvm.org/extra/clang-tidy/">Clang-Tidy</a><a href="#client-side"> <sup>3</sup></a>,
381+
<td><a href="https://clang.llvm.org/extra/clang-tidy/">Clang-Tidy</a><a href="#client-side"> <sup>2</sup></a>,
382382
<a href="http://cppcheck.sourceforge.net/">Cppcheck</a>,
383383
<a href="https://dwheeler.com/flawfinder/">Flawfinder</a>,
384-
<a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
384+
<a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
385385
<a href="https://trivy.dev">Trivy</a></td>
386386
</tr>
387387
<tr>
388388
<td>C#</td>
389389
<td><a href="https://github.com/SonarSource/sonar-dotnet">SonarC#</a>,
390-
<a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
390+
<a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
391391
<a href="https://trivy.dev">Trivy</a></td>
392392
</tr>
393393
<tr>
394394
<td>C++</td>
395-
<td><a href="https://clang.llvm.org/extra/clang-tidy/">Clang-Tidy</a><a href="#client-side"> <sup>3</sup></a>,
395+
<td><a href="https://clang.llvm.org/extra/clang-tidy/">Clang-Tidy</a><a href="#client-side"> <sup>2</sup></a>,
396396
<a href="http://cppcheck.sourceforge.net/">Cppcheck</a>,
397397
<a href="https://dwheeler.com/flawfinder/">Flawfinder</a>,
398-
<a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
398+
<a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
399399
<a href="https://trivy.dev">Trivy</a></td>
400400
</tr>
401401
<tr>
@@ -405,7 +405,7 @@ Security and risk management supports checking the languages and infrastructure-
405405
<tr>
406406
<td>Dockerfile</td>
407407
<td><a href="https://github.com/hadolint/hadolint">Hadolint</a>,
408-
<a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
408+
<a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
409409
<a href="https://trivy.dev">Trivy</a></td>
410410
</tr>
411411
<tr>
@@ -415,12 +415,12 @@ Security and risk management supports checking the languages and infrastructure-
415415
</tr>
416416
<tr>
417417
<td>GitHub Actions</td>
418-
<td><a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a></td>
418+
<td><a href="https://github.com/opengrep/opengrep/">Opengrep</a></td>
419419
</tr>
420420
<tr>
421421
<td>Go</td>
422-
<td><a href="https://github.com/securego/gosec">Gosec</a><a href="#client-side"> <sup>3</sup></a>,
423-
<a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
422+
<td><a href="https://github.com/securego/gosec">Gosec</a><a href="#client-side"> <sup>2</sup></a>,
423+
<a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
424424
<a href="https://trivy.dev">Trivy</a></td>
425425
</tr>
426426
<tr>
@@ -429,18 +429,18 @@ Security and risk management supports checking the languages and infrastructure-
429429
</tr>
430430
<tr>
431431
<td>Helm</td>
432-
<td><a href="https://trivy.dev">Trivy</a> <a href="#yaml-only"><sup>2</sup></a></td>
432+
<td><a href="https://trivy.dev">Trivy</a> <a href="#yaml-only"><sup>1</sup></a></td>
433433
</tr>
434434
<tr>
435435
<td>Java</td>
436-
<td><a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
437-
<a href="https://spotbugs.github.io/">SpotBugs</a><a href="#client-side"> <sup>3</sup></a><a href="#spotbugs-plugin"> <sup>4</sup></a>,
436+
<td><a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
437+
<a href="https://spotbugs.github.io/">SpotBugs</a><a href="#client-side"> <sup>2</sup></a><a href="#spotbugs-plugin"> <sup>3</sup></a>,
438438
<a href="https://trivy.dev">Trivy</a></td>
439439
</tr>
440440
<tr>
441441
<td>JavaScript</td>
442-
<td><a href="https://eslint.org/">ESLint</a> <a href="#eslint-plugin"><sup>5</sup></a>,
443-
<a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
442+
<td><a href="https://eslint.org/">ESLint</a> <a href="#eslint-plugin"><sup>4</sup></a>,
443+
<a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
444444
<a href="https://trivy.dev">Trivy</a></td>
445445
</tr>
446446
<tr>
@@ -449,21 +449,21 @@ Security and risk management supports checking the languages and infrastructure-
449449
</tr>
450450
<tr>
451451
<td>Kotlin</td>
452-
<td><a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a></td>
452+
<td><a href="https://github.com/opengrep/opengrep/">Opengrep</a></td>
453453
</tr>
454454
<tr>
455455
<td>Kubernetes</td>
456-
<td><a href="https://trivy.dev">Trivy</a> <a href="#yaml-only"><sup>2</sup></a></td>
456+
<td><a href="https://trivy.dev">Trivy</a> <a href="#yaml-only"><sup>1</sup></a></td>
457457
</tr>
458458
<tr>
459459
<td>Objective-C</td>
460-
<td><a href="https://clang.llvm.org/extra/clang-tidy/">Clang-Tidy</a><a href="#client-side"> <sup>3</sup></a></td>
460+
<td><a href="https://clang.llvm.org/extra/clang-tidy/">Clang-Tidy</a><a href="#client-side"> <sup>2</sup></a></td>
461461
</tr>
462462
<tr>
463463
<td>PHP</td>
464464
<td><a href="https://github.com/squizlabs/PHP_CodeSniffer">PHP_CodeSniffer</a>,
465465
<a href="https://phpmd.org/">PHP Mess Detector</a>,
466-
<a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
466+
<a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
467467
<a href="https://trivy.dev">Trivy</a></td>
468468
</tr>
469469
<tr>
@@ -476,39 +476,39 @@ Security and risk management supports checking the languages and infrastructure-
476476
<a href="https://github.com/landscapeio/prospector">Prospector</a>,
477477
<a href="https://github.com/pylint-dev/pylint">Pylint</a>,
478478
<a href="https://docs.astral.sh/ruff/">Ruff</a>,
479-
<a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
479+
<a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
480480
<a href="https://trivy.dev">Trivy</a></td>
481481
</tr>
482482
<tr>
483483
<td>Ruby</td>
484484
<td><a href="https://brakemanscanner.org/">Brakeman</a>,
485485
<a href="https://github.com/rubocop/rubocop">RuboCop</a>,
486-
<a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
486+
<a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
487487
<a href="https://trivy.dev">Trivy</a></td>
488488
</tr>
489489
<tr>
490490
<td>Rust</td>
491-
<td><a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
491+
<td><a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
492492
<a href="https://trivy.dev">Trivy</a></td>
493493
</tr>
494494
<tr>
495495
<td>Scala</td>
496496
<td><a href="https://github.com/codacy/codacy-scalameta">Codacy Scalameta Pro</a>,
497-
<a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
498-
<a href="https://spotbugs.github.io/">SpotBugs</a><a href="#client-side"> <sup>3</sup></a><a href="#spotbugs-plugin"> <sup>4</sup></a></td>
497+
<a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
498+
<a href="https://spotbugs.github.io/">SpotBugs</a><a href="#client-side"> <sup>2</sup></a><a href="#spotbugs-plugin"> <sup>3</sup></a></td>
499499
</tr>
500500
<tr>
501501
<td>Swift</td>
502-
<td><a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a></td>
502+
<td><a href="https://github.com/opengrep/opengrep/">Opengrep</a></td>
503503
</tr>
504504
<tr>
505505
<td>Shell</td>
506-
<td><a href="https://www.shellcheck.net/">ShellCheck</a>
507-
<a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a></td>
506+
<td><a href="https://www.shellcheck.net/">ShellCheck</a>,
507+
<a href="https://github.com/opengrep/opengrep/">Opengrep</a></td>
508508
</tr>
509509
<tr>
510510
<td>Terraform</td>
511-
<td><a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
511+
<td><a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
512512
<a href="https://trivy.dev">Trivy</a></td>
513513
</tr>
514514
<tr>
@@ -517,8 +517,8 @@ Security and risk management supports checking the languages and infrastructure-
517517
</tr>
518518
<tr>
519519
<td>TypeScript</td>
520-
<td><a href="https://eslint.org/">ESLint</a> <a href="#eslint-plugin"><sup>5</sup></a>,
521-
<a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
520+
<td><a href="https://eslint.org/">ESLint</a> <a href="#eslint-plugin"><sup>4</sup></a>,
521+
<a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
522522
<a href="https://trivy.dev">Trivy</a></td>
523523
</tr>
524524
<tr>
@@ -551,7 +551,7 @@ You're also able to click any dependency to find out more information about it.
551551

552552
![Security and risk management dependency page](images/security-risk-management-dependencies-single.png)
553553

554-
The dependency overview page offers a quick bird's-eye view of that particular dependency. You'll be able to see all different versions that are being used, including which repository is using them, the oldest and most recent versions you're leveraging, as well as the highest criticality of security issues, the license <a href="#license-scanning"><sup>6</sup></a> applied to any particular version of that dependency, and the [OSSF Scorecard](#ossf-scorecard) security assessment.
554+
The dependency overview page offers a quick bird's-eye view of that particular dependency. You'll be able to see all different versions that are being used, including which repository is using them, the oldest and most recent versions you're leveraging, as well as the highest criticality of security issues, the license <a href="#license-scanning"><sup>5</sup></a> applied to any particular version of that dependency, and the [OSSF Scorecard](#ossf-scorecard) security assessment.
555555

556556
### OSSF Scorecard {: id="ossf-scorecard"}
557557

@@ -577,12 +577,11 @@ This information helps you make informed decisions about the security risks asso
577577
![Security and risk management OSSF scorecard report](images/security-risk-management-ossf-scorecard.png)
578578

579579

580-
<sup><span id="semgrep">1</span></sup>: Semgrep supports additional security rules when signing up for [Semgrep Pro](https://semgrep.dev/pricing/).
581-
<sup><span id="yaml-only">2</span></sup>: Currently, Trivy only supports scanning YAML files on this platform.
582-
<sup><span id="client-side">3</span></sup>: Supported as a [client-side tool](../repositories-configure/local-analysis/client-side-tools.md).
583-
<sup><span id="spotbugs-plugin">4</span></sup>: Includes the plugin [Find Security Bugs](https://find-sec-bugs.github.io/).
584-
<sup><span id="eslint-plugin">5</span></sup>: Includes the plugins [no-unsanitized](https://www.npmjs.com/package/eslint-plugin-no-unsanitized), [security](https://www.npmjs.com/package/eslint-plugin-security), [security-node](https://www.npmjs.com/package/eslint-plugin-security-node), and [xss](https://www.npmjs.com/package/eslint-plugin-xss).
585-
<sup><span id="license-scanning">6</span></sup>: Visit the [supported languages and tools](../getting-started/supported-languages-and-tools.md#supported-languages-and-tools) page for a list of supported languages.
580+
<sup><span id="yaml-only">1</span></sup>: Currently, Trivy only supports scanning YAML files on this platform.
581+
<sup><span id="client-side">2</span></sup>: Supported as a [client-side tool](../repositories-configure/local-analysis/client-side-tools.md).
582+
<sup><span id="spotbugs-plugin">3</span></sup>: Includes the plugin [Find Security Bugs](https://find-sec-bugs.github.io/).
583+
<sup><span id="eslint-plugin">4</span></sup>: Includes the plugins [no-unsanitized](https://www.npmjs.com/package/eslint-plugin-no-unsanitized), [security](https://www.npmjs.com/package/eslint-plugin-security), [security-node](https://www.npmjs.com/package/eslint-plugin-security-node), and [xss](https://www.npmjs.com/package/eslint-plugin-xss).
584+
<sup><span id="license-scanning">5</span></sup>: Visit the [supported languages and tools](../getting-started/supported-languages-and-tools.md#supported-languages-and-tools) page for a list of supported languages.
586585

587586

588587
## App scanning {: id="app-scanning"}
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
---
2+
rss_title: Codacy release notes RSS feed
3+
rss_href: /feed_rss_created.xml
4+
---
5+
6+
7+
# Semgrep to Opengrep migration – February 2026
8+
9+
As we previously discussed on our [blog](https://blog.codacy.com/opengrep-vs-semgrep), there have been licensing changes to Semgrep, and Opengrep has emerged as an open-source fork of the Semgrep engine. To ensure your continued access to the existing patterns we have switched to Opengrep.
10+
11+
This change has been performed as a 1:1 replacement, preserving all existing patterns, issue history, and configuration. Going forward, we'll also be able to keep delivering custom Codacy rules to protect you against emerging threats, such as [hidden Unicode character vulnerabilities in rules files](https://blog.codacy.com/vulnerability-in-rules-files-with-hidden-unicode-characters).

docs/release-notes/index.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@ For product updates that are in progress or planned [visit the Codacy public roa
1818

1919
2026
2020

21+
- [Semgrep to Opengrep migration February, 2026](cloud/cloud-2026-02-migrating-semgrep.md)
2122
- [Cloud January 2026](cloud/cloud-2026-01.md)
2223
- [Adding GolangCI-Lint as new supported tool January, 2026](cloud/cloud-2026-01-adding-golangci-lint.md)
2324

docs/repositories-configure/codacy-configuration-file.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -203,7 +203,7 @@ roslyn
203203
rubocop
204204
ruff
205205
scalastyle
206-
semgrep
206+
opengrep
207207
shellcheck
208208
sonarcsharp
209209
sonarvb
@@ -217,7 +217,7 @@ tsqllint
217217

218218
The following names are **deprecated** and shouldn't be used, although they're still accepted in the Codacy configuration file:
219219

220-
- `bundleraudit` - The tool **bundler-audit** [is deprecated](../release-notes/cloud/cloud-2023-10-13-bundler-audit-deprecation.md). If you are using **Semprep** or **Trivy** instead, use the names `trivy` or `semgrep`.
220+
- `bundleraudit` - The tool **bundler-audit** [is deprecated](../release-notes/cloud/cloud-2023-10-13-bundler-audit-deprecation.md). If you are using **Opengrep** or **Trivy** instead, use the names `trivy` or `opengrep`.
221221
- `csslint` - The tool **CSSLint** [is deprecated](../release-notes/cloud/cloud-2023-10-25-csslint-jshint-fauxpas-tailor-tslint-deprecation.md). If you are using **Stylelint** instead, use the name `stylelint`.
222222
- `eslint` - Use the name `eslint-8` for **ESLint**.
223223
- `jshint`, `tslint` - The tools **JSHint** and **TSLint** [are deprecated](../release-notes/cloud/cloud-2023-10-25-csslint-jshint-fauxpas-tailor-tslint-deprecation.md). If you are using **ESLint** instead, use the name `eslint-8`.

docs/repositories-configure/configuring-code-patterns.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -242,7 +242,7 @@ The table below lists the configuration file names that Codacy detects and suppo
242242
<td></td>
243243
</tr>
244244
<tr>
245-
<td>Semgrep</td>
245+
<td>Opengrep</td>
246246
<td>Apex, C++, C#, Dockerfile, Elixir, GitHub Actions, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Rust, Scala, Shell, Swift, Terraform, TypeScript</td>
247247
<td><code>.semgrep.yaml</code></td>
248248
<td></td>

docs/repositories-configure/languages.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ If your repository contains source files with extensions not supported by Codacy
3131
{% include-markdown "../assets/includes/update-file-extensions-reanalyze.md" %}
3232

3333
!!! note
34-
Currently, the [Semgrep](https://github.com/codacy/codacy-semgrep) static analysis tool doesn't support custom file extensions.
34+
Currently, the [Opengrep](https://github.com/codacy/codacy-opengrep) static analysis tool doesn't support custom file extensions.
3535

3636
## Disabling analysis of a language {: id="disable-language"}
3737

0 commit comments

Comments
 (0)