home / skills / plurigrid / asi / semgrep
This skill runs semgrep static analysis to quickly scan code, create custom rules, and integrate taint mode into CI/CD workflows.
npx playbooks add skill plurigrid/asi --skill semgrepReview the files below or copy the command above to add this skill to your agents.
---
name: semgrep
description: Run Semgrep static analysis for fast security scanning and pattern matching. Use when asked to scan code with Semgrep, write custom YAML rules, find vulnerabilities quickly, use taint mode, or set up Semgrep in CI/CD pipelines.
category: static-analysis
author: Trail of Bits
source: trailofbits/skills
license: AGPL-3.0
trit: -1
trit_label: MINUS
verified: true
featured: true
---
# Semgrep Skill
**Trit**: -1 (MINUS)
**Category**: static-analysis
**Author**: Trail of Bits
**Source**: trailofbits/skills
**License**: AGPL-3.0
## Description
Run Semgrep static analysis for fast security scanning and pattern matching. Use when asked to scan code with Semgrep, write custom YAML rules, find vulnerabilities quickly, use taint mode, or set up Semgrep in CI/CD pipelines.
## When to Use
This is a Trail of Bits security skill. Refer to the original repository for detailed usage guidelines and examples.
See: https://github.com/trailofbits/skills
## Related Skills
- audit-context-building
- codeql
- semgrep
- variant-analysis
## SDF Interleaving
This skill connects to **Software Design for Flexibility** (Hanson & Sussman, 2021):
### Primary Chapter: 4. Pattern Matching
**Concepts**: unification, match, segment variables, pattern
### GF(3) Balanced Triad
```
semgrep (+) + SDF.Ch4 (+) + [balancer] (+) = 0
```
**Skill Trit**: 1 (PLUS - generation)
### Connection Pattern
Pattern matching extracts structure. This skill recognizes and transforms patterns.
This skill runs Semgrep static analysis to deliver fast security scanning and pattern matching across codebases. It helps create and apply custom YAML rules, run taint-mode flows, and integrate Semgrep scans into CI/CD pipelines for early vulnerability detection. The focus is on fast, rule-driven findings and actionable outputs that developers can act on quickly.
The skill invokes Semgrep to inspect source files using built-in and custom rule sets expressed in YAML patterns. It can run standard pattern matches or taint-mode analyses to track data flows, then formats and returns findings with locations, matching snippets, and rule metadata. It supports local scans, rule generation or modification, and CI integration guidance to automate recurring scans.
Can this skill create custom Semgrep rules?
Yes—write or modify YAML rule files with pattern and metadata fields; the skill can suggest patterns and validate them against sample code.
How do I reduce false positives from broad rules?
Tighten your patterns, add conditionals or contextual constraints, and test rules on representative samples before running full scans.