Listing Thumbnail

    Application Security Platform

     Info
    Deployed on AWS
    Application Security Testing
    4.6

    Overview

    Semgrep is a highly customizable application security platform built for security engineers and developers. Semgrep scans first and third-party code to find security issues unique to an organization, with an emphasis on surfacing actionable, low-noise, and developer friendly results at lightning speed.

    Semgrep's focus on confidence rating and reachability means that security teams can feel comfortable engaging developers directly in their workflows (e.g surfacing findings in PR comments), and Semgrep integrates seamlessly with CI and SCM tooling to automate these policies.

    With Semgrep, security teams can shift left and scale their programs with zero impact on developer velocity. With 3400+ out-of-the-box rules and the ability to easily create custom rules, Semgrep accelerates the time it takes to implement and scale a best-in-class AppSec program - all while adding value from Day 1.

    Highlights

    • Lightning fast code scanning that detects security vulnerabilities in 30+ languages with results prioritized for remediation
    • Reachability analysis of known vulnerabilities in used 3rd party software components make results actionable for developers
    • Easy-to-write custom rules to augment detection of security vulnerabilities, enforce coding standards, and improve code quality

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Application Security Platform

     Info
    Pricing is based on the duration and terms of your contract with the vendor, and additional usage. You pay upfront or in installments according to your contract terms with the vendor. This entitles you to a specified quantity of use for the contract duration. Usage-based pricing is in effect for overages or additional usage not covered in the contract. These charges are applied on top of the contract price. If you choose not to renew or replace your contract before the contract end date, access to your entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (3)

     Info
    Dimension
    Description
    Cost/12 months
    Code (SAST)
    Pro Engine + Pro Rules + Cloud Platform
    $480.00
    Supply Chain (SCA)
    Reachability + Dependency Search + License Compliance + Cloud Platform
    $480.00
    Secrets
    Secrets Scanning
    $720.00

    Additional usage costs (3)

     Info

    The following dimensions are not included in the contract terms, which will be charged based on your usage.

    Dimension
    Cost/user/hour
    Additional SAST Users
    $0.05
    Additional SCA Users
    $0.05
    Additional Secrets Users
    $0.08

    Vendor refund policy

    No refunds

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    25
    In Continuous Integration and Continuous Delivery
    Top
    10
    In Testing
    Top
    25
    In Generative AI

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Code Analysis
    "Static code scanning capability across 30+ programming languages with comprehensive vulnerability detection"
    Vulnerability Detection
    "Reachability analysis of known vulnerabilities in third-party software components with prioritized remediation"
    Rule Customization
    "Extensible rule creation mechanism for detecting security vulnerabilities and enforcing coding standards"
    Security Integration
    "Seamless integration with continuous integration and source code management toolchains"
    Multi-Language Support
    "Native scanning capabilities supporting multiple programming languages with consistent analysis approach"
    Static Application Security Testing
    Comprehensive vulnerability scanning for custom code across 25+ programming languages and frameworks
    Software Composition Analysis
    Automated identification and prioritization of vulnerabilities in open source software and third-party library dependencies
    Infrastructure as Code Analysis
    Detection of security misconfigurations in infrastructure template deployments to prevent potential security risks
    Real-time IDE Security Scanning
    Background vulnerability scanning during code development with immediate identification of risks in human and AI-generated code
    AI-Powered Remediation
    Context-aware AI agent that generates code remediation suggestions using proprietary databases and customized AI models
    Static Application Security Testing
    AI-tuned scanning at code generation with deep static analysis, identifying vulnerabilities across AI-generated and human-written code
    Open Source Security Management
    Comprehensive detection, prioritization, and automated remediation of open source component vulnerabilities
    Container Security
    End-to-end container security with image scanning, reachability analysis, secret detection, infrastructure-as-code scanning, and native Kubernetes integration
    AI Component Governance
    Inventory and risk assessment of AI components including models, agents, RAGs, with policy enforcement and Shadow AI detection
    Threat Simulation
    Proactive AI Red Teaming for simulating and identifying potential security risks in AI-powered applications

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.6
    56 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    43%
    50%
    5%
    2%
    0%
    1 AWS reviews
    |
    55 external reviews
    External reviews are from G2  and PeerSpot .
    Manjunath Maneppagol

    Context-aware code analysis has reduced noise and now improves developer experience with actionable security findings

    Reviewed on Nov 28, 2025
    Review from a verified AWS customer

    What is our primary use case?

    I have been working with Semgrep  for almost a year, approximately six to eight months on and off. In my current organization, I have a strong experience for SAST  solution POCs, and I have conducted POCs for Semgrep , Checkmarx, Snyk , and SonarQube  to evaluate SAST  capabilities.

    Our primary use case for Semgrep is to identify static code vulnerabilities and SAST vulnerabilities. Every other organization or vendor claims to offer this capability, but Semgrep is built differently compared to all these traditional tools. I have almost a decade of experience using various SAST tools, and Semgrep not only looks at particular code but understands the entire code to get context around whether an issue is real or not through context analysis.

    One of the primary use case for us is also the shift-left approach, which means improving our developer experience. Our developers do not want to wait until they commit changes to GitHub  or build it. They want synchronous feedback directly within their IDE . Semgrep provides an IDE  integration and also supports MCP gateway. Additionally, secrets scanning is another important use case for us.

    What is most valuable?

    The seamless integration of Semgrep into our existing platform is what I really appreciate. It is very easy, I was able to integrate and onboard it in just 10 to 15 minutes. This is in stark contrast to dealing with different SAST tools about integration across thousands of repos.

    Another great feature is that Semgrep greatly reduces the noise compared to other SAST tools. After scanning through the codebase and understanding it, Semgrep has a capability called AI analysis or AI triage. When you triage with AI, it gathers context around the finding and reduces the noise about 80 to 90 percent of the time, asking you to focus only on findings that really matter.

    Another excellent experience I had with Semgrep is when there was a finding that AI was not able to correctly diagnose or identify whether it was an actual finding or not. It reported it as a vulnerability, but when I verified it as a security engineer, I determined it was not a vulnerability in our case because we have compensatory controls in place. When I indicate this, Semgrep asks if it can apply the same logic to other similar findings. With a single click, it reduces a lot of noise for me, saving a huge amount of my time and effort.

    The results are also impressive. Most solutions identify a static query like raw SQL and simply say there is a SQL injection that is critical. Semgrep, however, looks into the query file and understands the context. It recognizes that this is a SQL query without any user input or database migration script, and it assigns appropriate risk. This intelligent capability of Semgrep is what impressed me.

    Semgrep will easily fit into the ecosystem you are building or the ecosystem you are working with. It is going to increase the developer experience in terms of how easily developers are able to understand the findings. It will also increase the security posture because developers are easily able to understand and fix those findings. Overall, the application security posture and the relationship between the development community and the security engineering will improve because Semgrep integrates so seamlessly and functions very smoothly.

    What needs improvement?

    I have consistently observed that their scan time is an issue for mono repos. Sometimes with their AI-based scanning, when you triage that scan, the scan never completes or finishes(, which makes it difficult. Another consistent issue is that whenever you have a new repo to onboard to the platform, the tool ideally should detect the master branch by default. However, sometimes the tool fails to identify it and will never scan it unless manually somebody looks into it and fixes the issue. Although their support team is really good, this issue was present six or eight months ago during the POC and is still present now. If it is affecting multiple customers, it should be prioritized and fixed.

    I would say that their integration aspects could have been improved. I see a lot of different security solutions that provide flexibility to the security teams based on Jira  project, team divisions, Slack, and all those can be very much easily customized. Semgrep needs to work on the enhancement of their notification capabilities. Currently, they are working on identifying business logic vulnerabilities or privilege escalation vulnerabilities by looking at the code, and they should continue to focus on and improve this effort.

    Regarding stability, whenever you have a mono-repo which is a very large repository, the scan never finishes or the scan never kicks in. At that time, you have to reach out to the support team and ask them to expand the resources in the back end to fix it. This is an issue I keep seeing often on that platform.

    For how long have I used the solution?

    I have been working with Semgrep on and off for almost a year, approximately six to eight months.

    What do I think about the stability of the solution?

    I have consistently observed that their scan time is an issue. Sometimes with their AI-based scanning, when you triage that scan, the scan never completes or finishes, which makes it difficult. Another consistent issue is that whenever you have a new repo to onboard to the platform, the tool ideally should detect the master branch by default. However, if there is no master branch or default branch, the tool fails to identify it and will never scan it unless manually somebody looks into it and fixes the issue. Although their support team is really good, this issue was present six or eight months ago during the POC and is still present now. If it is affecting multiple customers, it should be prioritized and fixed.

    I would say that their integration aspects could have been improved. I see a lot of different security solutions that provide flexibility to the security teams based on Jira  project, team divisions, Slack, and all those can be very much easily customized. Semgrep needs to work on the enhancement of their notification capabilities. Currently, they are working on identifying business logic vulnerabilities or privilege escalation vulnerabilities by looking at the code, and they should continue to focus on and improve this effort.

    Regarding stability, whenever you have a mono-repo which is a very large repository, the scan never finishes or the scan never kicks in. At that time, you have to reach out to the support team and ask them to expand the resources in the back end to fix it. This is an issue I keep seeing often on that platform.

    What do I think about the scalability of the solution?

    It is very easy to scale. When you say scaling, that means the number of users or organizations you need to onboard. I was able to control it from 10 repositories or 10 services to thousands of repositories in a couple of minutes very simply. They could potentially add some enhancements, but the platform is very much easily scalable.

    What other advice do I have?

    You should primarily focus on what your use case is and why you are moving out. If you are moving out just from the perspective of cost, I do not think Semgrep is the best solution for you. However, if you are looking for value for investment and want to have the complete visibility into your code with less noise, if you are not just looking for a SAST but are really looking for actionable results and want to improve your developer experience and feedback, then you should go for Semgrep. In my organization, it is not only me who selects the solution; I bring in developers from junior and senior levels of all experience and ask them to take a hands-on experience and give me feedback. If you want to improve the developer experience, then go for Semgrep.

    Compared to other competitors in the market, the AI-backed capability is the biggest strength of Semgrep. The seamless integration is another major advantage because I have done it for a few other solutions, some of which are extremely difficult and some are okay, but the Semgrep integration with the code repository was the smoothest. The quality of results and reduction in noise are also strengths compared to other competitors. Semgrep also has a great strength in the number of rule sets they have compared to all other vendors. While all other vendors have very limited numbers even though they claim to be enterprise, their community edition itself has close to 4,000 rules and the enterprise edition has around 20,000 rules. That is a really strong advantage.

    As for limitations, I would say that Semgrep currently just supports Jira and Slack for integrations. They should expand to different integrations like ServiceNow  and other CNAP and CSPM solutions where all results can be brought into one place.

    I would rate this review an 8 out of 10.

    Shreekanth k.

    Streamlined Code Security with Semgrep

    Reviewed on Nov 18, 2025
    Review provided by G2
    What do you like best about the product?
    I appreciate using Semgrep for its robust security scanning capabilities, particularly in our code security scans for Azure Data Factory, Azure Databricks notebooks, and Python code. The setup was straightforward and integrated seamlessly into our pipeline without much hassle, demonstrating an ease of use that contrasts sharply with other tools. One of the standout features for me is the low false positive rate; it effectively identifies actual security issues without wasting time on false alerts, which makes it incredibly efficient. The built-in rules are comprehensive, covering most major languages we use and providing thorough checks for common vulnerabilities. The scan results are transparent and actionable, pinpointing the exact line in the code where issues arise and offering clear guidance on how to fix them, significantly speeding up remediation. I also find the performance to be solid, not hindering our build processes with delays. Additionally, after investing time in learning how to write custom rules tailored to our specific needs, I realized the powerful flexibility Semgrep offers. Overall, it has markedly enhanced our code review process by focusing attention on genuine issues and aiding in the early detection of security concerns. This has ultimately strengthened our development workflow and reduced the time spent on security risks. I wholeheartedly recommend Semgrep as a practical SAST tool that delivers exceptional results while being manageable to maintain.
    What do you dislike about the product?
    The custom rule syntax took some time to learn and was not intuitive initially. Additionally, sometimes Semgrep misses complex security patterns that span multiple functions or files, necessitating manual reviews for such cases. Furthermore, the rule documentation could be improved with more real-world examples. Better integration with our specific IDE and possibly some AI-assisted rule suggestions based on our code base patterns would also be beneficial.
    What problems is the product solving and how is that benefiting you?
    I use Semgrep to catch security vulnerabilities and code quality issues early, saving time on manual reviews and reducing security risks. It offers actionable scan results, minimal false positives, and customizable rules, all enhancing our development efficiency.
    Anupam J.

    Powerful Rule Engine and Autofix, but Governance at Scale Needs Work

    Reviewed on Nov 01, 2025
    Review provided by G2
    What do you like best about the product?
    Flexible, transparent rule engine with clear YAML syntax and data‑flow patterns, plus an extensive public registry for quick wins and customization.
    • Smooth CI/CD integration and lightweight runtime, enabling frequent scans without major impact on developer velocity.
    • Autofix capabilities (deterministic rule‑based and Assistant AI‑assisted) that propose or apply safe code changes, reducing mean time to remediate
    What do you dislike about the product?
    Governance overhead at scale; maintaining org‑wide rule sets, exceptions, and updates across many repos becomes an operational burden without a dedicated owner.
    • Autofix and AI noise filtering are helpful but still evolving; effectiveness varies by language and codebase, and some teams remain cautious about applying fixes automatically.
    What problems is the product solving and how is that benefiting you?
    Semgrep is helping embed security into daily development by catching risky patterns early in pull requests and CI, which reduces rework and keeps release velocity high. Transparent, customizable rules let the team encode our own guardrails and quickly add checks for new frameworks, so coverage improves without waiting on vendor updates. AI‑assisted noise filtering and autofix guidance cut triage time and help developers resolve issues faster, which lowers MTTR and helps us meet remediation SLAs more consistently.
    Operationally, fast scans and easy CI/SCM integration mean developers see actionable feedback where they work, not in a separate portal, increasing adoption and fixing rates. As a result, we’ve moved from sporadic security reviews to consistent, automated checks across services, with measurable gains in fix rate and fewer high‑risk patterns reaching production. The net benefit is stronger secure‑by‑default practices with minimal productivity tax, plus lower compliance risk thanks to policy‑as‑code rules we can audit and evolve over time.
    Nagaraju A.

    Easy to Use with Great Functional Testing Capabilities

    Reviewed on Oct 31, 2025
    Review provided by G2
    What do you like best about the product?
    I appreciate how Semgrep excels in validating and QA testing capabilities, showing good efficacy in performing these tasks. The ease of use is particularly notable, requiring less scripting compared to other alternatives, and the initial setup process was straightforward and effortless. I value its functionality in conducting functional testing, which simplifies my tasks significantly. The test case design and resulting outcomes are particularly pleasing, enhancing my testing process. Whenever I encounter issues that other tools cannot resolve, Semgrep becomes an indispensable resource, allowing me to progress by utilizing its features effectively. Overall, I find Semgrep a worthy exploration for its functionality and user-friendly approach.
    What do you dislike about the product?
    Nothing
    What problems is the product solving and how is that benefiting you?
    I find Semgrep improves my workflow for functional testing, making it easy to use and reducing scripting. It solves problems when other tools fail, helping me proceed further and block issues effectively.
    Hospital & Health Care

    Flexible Rules and GitHub Integration Shine, But Needs Better Product Segmentation

    Reviewed on Oct 31, 2025
    Review provided by G2
    What do you like best about the product?
    Semgrep offers a single platform for SAST and SCA solutions which is good, but the best part is semgrep rules they are so flexible and easy to write that you dont need to manually do filtering or removing.
    The tool has another feature I personally like is github actions that will show bugs in git itself with an AI reviewed fixed version.
    What do you dislike about the product?
    Semgrep doesnt have Product wise segmentation like for organizations with multiple products you will have only projects and have to use labels to categorise those products.
    What problems is the product solving and how is that benefiting you?
    It provides great SCA and SAST solutioning.
    View all reviews