Skip to content

Commit 45c2f82

Browse files
feat: Add opengrep migration docs CF-2184
1 parent ba7a750 commit 45c2f82

8 files changed

Lines changed: 94 additions & 83 deletions

File tree

.github/styles/config/vocabularies/Codacy/accept.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,7 @@ monorepo
5757
namespace
5858
OAuth
5959
onboarding
60+
Opengrep
6061
PHP_CodeSniffer
6162
PHPUnit
6263
plaintext
@@ -75,7 +76,6 @@ sbt
7576
Scalameta
7677
Scalastyle
7778
SCSSLint
78-
Semgrep
7979
Serverless
8080
severities
8181
ShellCheck

docs/getting-started/supported-languages-and-tools.md

Lines changed: 58 additions & 58 deletions
Large diffs are not rendered by default.

docs/organizations/managing-security-and-risk.md

Lines changed: 19 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -369,7 +369,7 @@ Security and risk management supports checking the languages and infrastructure-
369369
<tr>
370370
<td>Apex</td>
371371
<td><a href="https://pmd.github.io/">PMD</a>,
372-
<a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a></td>
372+
<a href="https://github.com/opengrep/opengrep/">Opengrep</a> </td>
373373
</tr>
374374
<tr>
375375
<td>AWS CloudFormation</td>
@@ -381,21 +381,21 @@ Security and risk management supports checking the languages and infrastructure-
381381
<td><a href="https://clang.llvm.org/extra/clang-tidy/">Clang-Tidy</a><a href="#client-side"> <sup>3</sup></a>,
382382
<a href="http://cppcheck.sourceforge.net/">Cppcheck</a>,
383383
<a href="https://dwheeler.com/flawfinder/">Flawfinder</a>,
384-
<a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
384+
<a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
385385
<a href="https://trivy.dev">Trivy</a></td>
386386
</tr>
387387
<tr>
388388
<td>C#</td>
389389
<td><a href="https://github.com/SonarSource/sonar-dotnet">SonarC#</a>,
390-
<a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
390+
<a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
391391
<a href="https://trivy.dev">Trivy</a></td>
392392
</tr>
393393
<tr>
394394
<td>C++</td>
395395
<td><a href="https://clang.llvm.org/extra/clang-tidy/">Clang-Tidy</a><a href="#client-side"> <sup>3</sup></a>,
396396
<a href="http://cppcheck.sourceforge.net/">Cppcheck</a>,
397397
<a href="https://dwheeler.com/flawfinder/">Flawfinder</a>,
398-
<a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
398+
<a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
399399
<a href="https://trivy.dev">Trivy</a></td>
400400
</tr>
401401
<tr>
@@ -405,7 +405,7 @@ Security and risk management supports checking the languages and infrastructure-
405405
<tr>
406406
<td>Dockerfile</td>
407407
<td><a href="https://github.com/hadolint/hadolint">Hadolint</a>,
408-
<a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
408+
<a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
409409
<a href="https://trivy.dev">Trivy</a></td>
410410
</tr>
411411
<tr>
@@ -415,12 +415,12 @@ Security and risk management supports checking the languages and infrastructure-
415415
</tr>
416416
<tr>
417417
<td>GitHub Actions</td>
418-
<td><a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a></td>
418+
<td><a href="https://github.com/opengrep/opengrep/">Opengrep</a></td>
419419
</tr>
420420
<tr>
421421
<td>Go</td>
422422
<td><a href="https://github.com/securego/gosec">Gosec</a><a href="#client-side"> <sup>3</sup></a>,
423-
<a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
423+
<a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
424424
<a href="https://trivy.dev">Trivy</a></td>
425425
</tr>
426426
<tr>
@@ -433,14 +433,14 @@ Security and risk management supports checking the languages and infrastructure-
433433
</tr>
434434
<tr>
435435
<td>Java</td>
436-
<td><a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
436+
<td><a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
437437
<a href="https://spotbugs.github.io/">SpotBugs</a><a href="#client-side"> <sup>3</sup></a><a href="#spotbugs-plugin"> <sup>4</sup></a>,
438438
<a href="https://trivy.dev">Trivy</a></td>
439439
</tr>
440440
<tr>
441441
<td>JavaScript</td>
442442
<td><a href="https://eslint.org/">ESLint</a> <a href="#eslint-plugin"><sup>5</sup></a>,
443-
<a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
443+
<a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
444444
<a href="https://trivy.dev">Trivy</a></td>
445445
</tr>
446446
<tr>
@@ -449,7 +449,7 @@ Security and risk management supports checking the languages and infrastructure-
449449
</tr>
450450
<tr>
451451
<td>Kotlin</td>
452-
<td><a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a></td>
452+
<td><a href="https://github.com/opengrep/opengrep/">Opengrep</a></td>
453453
</tr>
454454
<tr>
455455
<td>Kubernetes</td>
@@ -463,7 +463,7 @@ Security and risk management supports checking the languages and infrastructure-
463463
<td>PHP</td>
464464
<td><a href="https://github.com/squizlabs/PHP_CodeSniffer">PHP_CodeSniffer</a>,
465465
<a href="https://phpmd.org/">PHP Mess Detector</a>,
466-
<a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
466+
<a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
467467
<a href="https://trivy.dev">Trivy</a></td>
468468
</tr>
469469
<tr>
@@ -476,39 +476,39 @@ Security and risk management supports checking the languages and infrastructure-
476476
<a href="https://github.com/landscapeio/prospector">Prospector</a>,
477477
<a href="https://github.com/pylint-dev/pylint">Pylint</a>,
478478
<a href="https://docs.astral.sh/ruff/">Ruff</a>,
479-
<a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
479+
<a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
480480
<a href="https://trivy.dev">Trivy</a></td>
481481
</tr>
482482
<tr>
483483
<td>Ruby</td>
484484
<td><a href="https://brakemanscanner.org/">Brakeman</a>,
485485
<a href="https://github.com/rubocop/rubocop">RuboCop</a>,
486-
<a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
486+
<a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
487487
<a href="https://trivy.dev">Trivy</a></td>
488488
</tr>
489489
<tr>
490490
<td>Rust</td>
491-
<td><a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
491+
<td><a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
492492
<a href="https://trivy.dev">Trivy</a></td>
493493
</tr>
494494
<tr>
495495
<td>Scala</td>
496496
<td><a href="https://github.com/codacy/codacy-scalameta">Codacy Scalameta Pro</a>,
497-
<a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
497+
<a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
498498
<a href="https://spotbugs.github.io/">SpotBugs</a><a href="#client-side"> <sup>3</sup></a><a href="#spotbugs-plugin"> <sup>4</sup></a></td>
499499
</tr>
500500
<tr>
501501
<td>Swift</td>
502-
<td><a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a></td>
502+
<td><a href="https://github.com/opengrep/opengrep/">Opengrep</a></td>
503503
</tr>
504504
<tr>
505505
<td>Shell</td>
506506
<td><a href="https://www.shellcheck.net/">ShellCheck</a>
507-
<a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a></td>
507+
<a href="https://github.com/opengrep/opengrep/">Opengrep</a></td>
508508
</tr>
509509
<tr>
510510
<td>Terraform</td>
511-
<td><a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
511+
<td><a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
512512
<a href="https://trivy.dev">Trivy</a></td>
513513
</tr>
514514
<tr>
@@ -518,7 +518,7 @@ Security and risk management supports checking the languages and infrastructure-
518518
<tr>
519519
<td>TypeScript</td>
520520
<td><a href="https://eslint.org/">ESLint</a> <a href="#eslint-plugin"><sup>5</sup></a>,
521-
<a href="https://semgrep.dev/">Semgrep</a> <a href="#semgrep"><sup>1</sup></a>,
521+
<a href="https://github.com/opengrep/opengrep/">Opengrep</a>,
522522
<a href="https://trivy.dev">Trivy</a></td>
523523
</tr>
524524
<tr>
@@ -577,7 +577,6 @@ This information helps you make informed decisions about the security risks asso
577577
![Security and risk management OSSF scorecard report](images/security-risk-management-ossf-scorecard.png)
578578

579579

580-
<sup><span id="semgrep">1</span></sup>: Semgrep supports additional security rules when signing up for [Semgrep Pro](https://semgrep.dev/pricing/).
581580
<sup><span id="yaml-only">2</span></sup>: Currently, Trivy only supports scanning YAML files on this platform.
582581
<sup><span id="client-side">3</span></sup>: Supported as a [client-side tool](../repositories-configure/local-analysis/client-side-tools.md).
583582
<sup><span id="spotbugs-plugin">4</span></sup>: Includes the plugin [Find Security Bugs](https://find-sec-bugs.github.io/).
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
---
2+
rss_title: Codacy release notes RSS feed
3+
rss_href: /feed_rss_created.xml
4+
---
5+
6+
7+
# Semgrep to Opengrep migration – February 2026
8+
9+
As we previously discussed on our [blog](https://blog.codacy.com/opengrep-vs-semgrep), there have been licensing changes to Semgrep, and Opengrep has emerged as an open-source fork of the Semgrep engine. To ensure your continued access to the existing patterns we have switched to Opengrep.
10+
11+
This change has been performed as a 1:1 replacement, preserving all existing patterns, issue history, and configuration. Going forward, we'll also be able to keep delivering custom Codacy rules to protect you against emerging threats, such as [hidden Unicode character vulnerabilities in rules files](https://blog.codacy.com/vulnerability-in-rules-files-with-hidden-unicode-characters).

docs/release-notes/index.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@ For product updates that are in progress or planned [visit the Codacy public roa
1818

1919
2026
2020

21+
- [Semgrep to Opengrep migration February, 2026](cloud/cloud-2026-02-migrating-semgrep.md)
2122
- [Cloud January 2026](cloud/cloud-2026-01.md)
2223
- [Adding GolangCI-Lint as new supported tool January, 2026](cloud/cloud-2026-01-adding-golangci-lint.md)
2324

docs/repositories-configure/codacy-configuration-file.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -203,7 +203,7 @@ roslyn
203203
rubocop
204204
ruff
205205
scalastyle
206-
semgrep
206+
opengrep
207207
shellcheck
208208
sonarcsharp
209209
sonarvb
@@ -217,7 +217,7 @@ tsqllint
217217

218218
The following names are **deprecated** and shouldn't be used, although they're still accepted in the Codacy configuration file:
219219

220-
- `bundleraudit` - The tool **bundler-audit** [is deprecated](../release-notes/cloud/cloud-2023-10-13-bundler-audit-deprecation.md). If you are using **Semprep** or **Trivy** instead, use the names `trivy` or `semgrep`.
220+
- `bundleraudit` - The tool **bundler-audit** [is deprecated](../release-notes/cloud/cloud-2023-10-13-bundler-audit-deprecation.md). If you are using **Opengrep** or **Trivy** instead, use the names `trivy` or `opengrep`.
221221
- `csslint` - The tool **CSSLint** [is deprecated](../release-notes/cloud/cloud-2023-10-25-csslint-jshint-fauxpas-tailor-tslint-deprecation.md). If you are using **Stylelint** instead, use the name `stylelint`.
222222
- `eslint` - Use the name `eslint-8` for **ESLint**.
223223
- `jshint`, `tslint` - The tools **JSHint** and **TSLint** [are deprecated](../release-notes/cloud/cloud-2023-10-25-csslint-jshint-fauxpas-tailor-tslint-deprecation.md). If you are using **ESLint** instead, use the name `eslint-8`.

docs/repositories-configure/configuring-code-patterns.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -242,7 +242,7 @@ The table below lists the configuration file names that Codacy detects and suppo
242242
<td></td>
243243
</tr>
244244
<tr>
245-
<td>Semgrep</td>
245+
<td>Opengrep</td>
246246
<td>Apex, C++, C#, Dockerfile, Elixir, GitHub Actions, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Rust, Scala, Shell, Swift, Terraform, TypeScript</td>
247247
<td><code>.semgrep.yaml</code></td>
248248
<td></td>

docs/repositories-configure/languages.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ If your repository contains source files with extensions not supported by Codacy
3131
{% include-markdown "../assets/includes/update-file-extensions-reanalyze.md" %}
3232

3333
!!! note
34-
Currently, the [Semgrep](https://github.com/codacy/codacy-semgrep) static analysis tool doesn't support custom file extensions.
34+
Currently, the [Opengrep](https://github.com/codacy/codacy-opengrep) static analysis tool doesn't support custom file extensions.
3535

3636
## Disabling analysis of a language {: id="disable-language"}
3737

0 commit comments

Comments
 (0)