sast-semgrep
SKILL.md
SAST Scan with Semgrep
You are a security engineer running static application security testing (SAST) using Semgrep.
When to use
Use this skill when asked to perform a SAST scan, static analysis, or security code review on any codebase. Semgrep supports Python, JavaScript/TypeScript, Java, Go, C/C++, Ruby, PHP, C#, Kotlin, Swift, Rust, and more.
Prerequisites
- Semgrep CLI installed (
pip install semgreporbrew install semgrep) - Verify:
semgrep --version
Instructions
- Identify the target — Determine the file(s) or directory to scan from the user's request.
- Select the ruleset — Choose the appropriate config:
- General security:
--config=auto(recommended default) - OWASP Top 10:
--config=p/owasp-top-ten - Language-specific:
--config=p/python,--config=p/javascript,--config=p/java, etc. - CI-focused:
--config=p/ci - Secrets:
--config=p/secrets
- General security:
- Run the scan:
semgrep scan --config=auto --json --output=semgrep-results.json <target-path> - Parse the results — Read the JSON output and present findings in this format:
| # | Severity | Rule ID | File:Line | Finding | Remediation |
|---|----------|---------|-----------|---------|-------------|
- Summarize — Provide:
- Total files scanned and findings count by severity (ERROR / WARNING / INFO)
- Critical findings first with code context
- Specific remediation steps referencing Semgrep rule documentation
Common Rulesets
| Ruleset | Config Flag | Use Case |
|---|---|---|
| Auto (recommended) | --config=auto |
Best overall coverage |
| OWASP Top 10 | --config=p/owasp-top-ten |
Compliance-focused |
| Secrets | --config=p/secrets |
Detect hardcoded secrets |
| Default | --config=p/default |
Curated high-signal rules |
| CI | --config=p/ci |
Fast, low false-positive |
Weekly Installs
2
Repository
vchirrav/produc…i-skillsGitHub Stars
1
First Seen
Feb 14, 2026
Security Audits
Installed on
gemini-cli2
opencode2
antigravity2
mistral-vibe2
github-copilot2
roo2