Skip to main content
Static analysis and security scanning. The Semgrep connector gives agents the ability to scan code for security vulnerabilities, supply chain risks, and leaked secrets — covering 30+ programming languages with 5,000+ built-in rules.

Setup

  1. Go to Integrations and find Semgrep
  2. Click Connect
  3. Enter your Semgrep API token (get one here — optional for basic scanning, required for cloud features)
  4. Click Save — Proliferate will test the connection automatically
Basic scanning works without an API token. The token is needed for Semgrep AppSec Platform features like fetching cloud findings.

Available tools

ToolDescription
security_checkQuick security scan of code (high-level convenience tool)
semgrep_scanScan code with a given config (e.g., auto, p/docker, p/xss). Accepts an array of file path + content objects.
semgrep_scan_with_custom_ruleScan using custom Semgrep YAML rules
semgrep_findingsFetch findings from the Semgrep AppSec Platform (requires API token)
get_abstract_syntax_treeGet the AST of provided code
supported_languagesList all supported languages
semgrep_rule_schemaFetch the latest Semgrep rule JSON schema

Use cases

  • Scan code diffs in PR review automations and flag security findings as comments
  • Enforce org-specific coding standards via custom rules (e.g., “no raw SQL outside db.ts”)
  • Detect leaked API keys, tokens, and credentials in commits
The tools listed above may not be exhaustive and can change as Semgrep updates their MCP server. See Semgrep MCP documentation for the latest.