Skip to content

ci(security): enable Semgrep SAST#13

Merged
WomB0ComB0 merged 1 commit intomainfrom
chore/enable-semgrep
Apr 15, 2026
Merged

ci(security): enable Semgrep SAST#13
WomB0ComB0 merged 1 commit intomainfrom
chore/enable-semgrep

Conversation

@WomB0ComB0
Copy link
Copy Markdown
Member

@WomB0ComB0 WomB0ComB0 commented Apr 15, 2026

Flip enable-semgrep: true on this repo's caller of the org-wide security-scan.yml. The reusable workflow now includes a Semgrep SAST job that runs when SEMGREP_APP_TOKEN is set at the org level (which it is).

Findings appear in Semgrep Cloud and as PR check annotations.

🤖 Generated with Claude Code

Summary by CodeRabbit

  • Chores
    • Enhanced security scanning configuration with additional analysis tools enabled for improved code security checks.

@gemini-code-assist
Copy link
Copy Markdown

Note

Gemini is unable to generate a review for this pull request due to the file types involved not being currently supported.

@coderabbitai
Copy link
Copy Markdown

coderabbitai bot commented Apr 15, 2026

No actionable comments were generated in the recent review. 🎉

ℹ️ Recent review info
⚙️ Run configuration

Configuration used: defaults

Review profile: CHILL

Plan: Pro

Run ID: 8d154c91-befd-4dd9-8ffd-c6036bfb47c7

📥 Commits

Reviewing files that changed from the base of the PR and between a315021 and 66c8ac3.

📒 Files selected for processing (1)
  • .github/workflows/security.yml

📝 Walkthrough

Walkthrough

The security workflow configuration was updated to enable Semgrep scanning in the reused security-scan workflow. A single configuration input enable-semgrep: true was added to the downstream workflow call alongside the existing language specification.

Changes

Cohort / File(s) Summary
Workflow Configuration
.github/workflows/security.yml
Added enable-semgrep: true input to the reused security-scan workflow call, enabling Semgrep as part of the security scanning pipeline.

Estimated code review effort

🎯 1 (Trivial) | ⏱️ ~3 minutes

Poem

🐰 A little hop, a config tweak so bright,
Semgrep now awakens in the security night,
One line of truth, a scan made more keen,
Safer code flows through the build machine! ✨

🚥 Pre-merge checks | ✅ 3
✅ Passed checks (3 passed)
Check name Status Explanation
Description Check ✅ Passed Check skipped - CodeRabbit’s high-level summary is enabled.
Title check ✅ Passed The pull request title 'ci(security): enable Semgrep SAST' accurately and concisely describes the main change—enabling Semgrep static analysis scanning in the CI workflow.
Docstring Coverage ✅ Passed No functions found in the changed files to evaluate docstring coverage. Skipping docstring coverage check.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Commit unit tests in branch chore/enable-semgrep

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

@WomB0ComB0 WomB0ComB0 merged commit 65adc1c into main Apr 15, 2026
6 checks passed
@WomB0ComB0 WomB0ComB0 deleted the chore/enable-semgrep branch April 15, 2026 04:39
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant