r2c.dev Open in urlscan Pro
2600:9000:225a:5400:b:c420:2d40:93a1  Public Scan

Submitted URL: http://r2c.dev/
Effective URL: https://r2c.dev/
Submission: On May 06 via api from GB — Scanned from GB

Form analysis 0 forms found in the DOM

Text Content

SemgrepTeamBlogPricing



SHIFT LEFT WITH FAST STATIC ANALYSIS

Modern security teams are “paving the road” for their developers — enforcing
code standards on every commit. r2c’s fast, open-source static analysis tool,
Semgrep®️, gives you the rules, building blocks, and infrastructure to shift
left and scale your security program.

Get Started
This video format is not supported.


Great teams trust and contribute to Semgrep.



ENFORCE SECURITY ON EVERY COMMIT

Semgrep is a fast, open-source, static analysis tool for modern languages. With
1,000+ existing rules and simple-to-create custom ones, it finds the bugs that
matter.

Semgrep can run anywhere: in CI, your editor, or the command-line. Plus, with
dedicated infrastructure from r2c, it’s easy to deploy, manage, and monitor
Semgrep at scale.

Get Started
 * Languages
 * Integrations

+ more



 * Daniel Cuthbert
   Co-author, OWASP ASVS standard
   
   @dcuthbert
   
   The evolution of bug hunting is currently happening and it’s pretty damn
   cool. We’ve become accustomed to clunky monolithic tools that add friction
   and cost a fortune, but amongst these dinosaurs has risen Semgrep and it’s
   really showing people how you too can be a lean mean fighting bug hunting
   machine.

 * Dev Akhawe
   Head of Security, Figma
   
   @frgx
   
   With its GitHub integration, Semgrep brings security analysis to where
   development happens. Figmates get security feedback in their PRs, while rule
   analytics give the security team feedback on the effectiveness of our rules
   and patterns. The simple grep like syntax lets us extend Semgrep to catch new
   patterns, going from idea to live in an hour.

 * Jobert Abma
   Co-founder, HackerOne
   
   @jobertabma
   
   Semgrep offers an intuitive rule engine interface that I haven’t seen in any
   other static code analysis tool…Other tools are often poorly documented and
   difficult to write, understand, and maintain. Semgrep makes it easy to
   rewrite complex matchers into one or two simple rules that are easy to
   maintain by almost all engineers.

 * Abhay Bhargav
   Founder & Chief Technologist, we45
   
   @abhaybhargav
   
   I’ve fallen in love with an awesome tool recently, called Semgrep. It’s a
   lightweight static analysis tool for many languages. Along with Github’s
   CodeQL, it is — in my opinion — the future of AppSec and DevSecOps.

 * Jacob Salassi
   Cloud Security Architect, Snowflake
   
   @jacobsalassi
   
   I love that Semgrep lets Snowflake software engineers write rules to enforce
   security standards and requirements. Snowflake is all about empowering
   software engineers to express domain specific security requirements
   themselves. With Semgrep, each team can assert their security requirements
   easily and continuously, enabling us to scale and re-use this capability
   across the entire org.




EASILY WRITE CUSTOM RULES

When off-the-shelf rules aren’t enough, quickly and intuitively write custom
rules to express your unique code standards.
Rules look like the code you’re searching. For example, rules for Go look like
Go. Find function calls, class or method definitions, and more without having to
understand abstract syntax trees or wrestle with regexes.

In 5 minutes my team was able to write a rule that finds all unauthenticated
routes.

Jonathan Werrett

 | @werrett

Head of Information Security, Fitbit

This Semgrep pattern...
 * print(...)
 * $X == $X
 * boto3.client(..., key_id = "...", secret_key = "...")
 * hello('world')
 * foo(1)

...matches this source code:

1def hello_world(abc):
2  logger.info('starting skynet')
3  skynet.init()
4
5  # oops, this should be removed 
6  # or use the logging framework
7  print(f'DEBUG: {skynet.iv}')
8
9  return skynet.rule_forever()

Have you ever accidentally left a print statement in your code and then
committed it? It’s easy to write a Semgrep rule to find a functional call
likeprint.


Semgrep can even provide an autofix for line 6, like replacing it with:
logger.info(f'DEBUG: {skynet.iv}')








PREVENT BUGS THAT MATTER, IMMEDIATELY

Semgrep’s registry has 1,000+ open-source rules covering security, correctness,
and performance bugs. Don’t DIY unless you want to.
Semgrep runs fast, presenting results that matter immediately in your workflow.
Rules are tested over thousands of projects and improved by an amazing OSS
community, OWASP members, and r2c.

As the CTO of a rapidly growing software security company, making our own
development secure is critical to our business. Semgrep picks the right rules
for us and runs them quickly in the right place. And I can still write custom
rules to catch specific issues unique to our code.

Jean-Baptiste Aviat

 | @JbAviat

Co-founder & CTO, Sqreen


SCALE YOUR SECURITY

Semgrep App provide SaaS infrastructure for operating a modern AppSec program
— enforcing security on every commit and shifting left. With Semgrep App you
can:
 * Centrally define code standards for your projects
 * See results where you already work: GitHub, GitLab, Slack, Jira, VS Code, and
   more
 * Monitor the impact of your standards on security
 * Host private rules

Semgrep reduced our security review load by pinpointing code we actually care
about in our monolithic repos. Now we can guide developers towards writing more
secure code without direct involvement from the security team.

Jasvir Nagra

 | @jasvir

Security Engineer, Dropbox



Semgrep bridges a gap between fast and accurate tooling that hadn’t been
possible with the traditional approach to code scanning.

Chris Rioux

 | @christienrioux

Co-founder, Veracode

A product is only as good as its developers: the r2c team consistently provides
incredibly responsive and rapid support. Semgrep is the code
validation/enforcement tool you need — you just do not realize it yet!

Michael Sorens

 | @msorens

Sr. Software Engineer, Chef

I just want to re-iterate that there's almost zero time between thinking ‘I
should find code that looks like this’ and having a check that finds code that
looks like that.

Damian Gryski

 | @dgryski

Gopher

Get Started
Home|Semgrep|Team|Blog|Pricing

© 2022 and made with ♥ by r2c,
a software security company

Semgrep®️ is a registered trademark of r2c.




For sales and partner inquiries:
sales@r2c.dev

For general inquiries:
hello@r2c.dev

To write us about a security issue:
security@r2c.dev