hybrid server
The server is able to function both locally and remotely, depending on the configuration or use case.
Integrations
Provides instructions for running the MCP server in a containerized environment using Docker.
Includes integration references for accessing repositories and issue tracking functionality.
Provides a Python client interface for interacting with the MCP server and executing Semgrep scans programmatically.
Semgrep MCP Server
An MCP server for using Semgrep to scan code for security vulnerabilies. Secure your vibe coding! 😅
Model Context Protocol (MCP) is a standardized API for LLMs, Agents, and IDEs like Cursor, VS Code, Windsurf, or anything that supports MCP, to get specialized help, context, and harness the power of tools. Semgrep is a fast, deterministic static analysis semantically understands many languages and comes with with over 5,000 rules. 🛠️
Note
This beta project is under active development, we would love your feedback, bug reports, feature requests, and code. Join the #mcp
community slack channel!
Contents
- Getting Started
- Demo
- API
- Usage
- Semgrep AppSec Platform
- Integrations
- Contributing, Community, and Running From Source
Getting started
Run the python package as a CLI command using uv
:
or as a docker container:
Cursor
example mcp.json
Add an instruction to your .cursor/rules
to use automatically
Hosted Server
Warning
This is an experimental server that may break. Once the MCP spec gains support for HTTP Streaming and OAuth in the near future, it will gain new functionality. 🚀
mcp.json
Demo
API
Tools
Enable LLMs to perform actions, make deterministic computations, and interact with external services.
Scanning Code
security_check
: Scan code for security vulnerabilitiessemgrep_scan
: Scan code files for security vulnerabilities with a given config stringsemgrep_scan_with_custom_rule
: Scan code files using a custom Semgrep rule
Understanding Code
get_abstract_syntax_tree
: Output the Abstract Syntax Tree (AST) of code
Meta
supported_languages
: Return the list of langauges Semgrep supportssemgrep_rule_schema
: Fetches the latest semgrep rule JSON Schema
Prompts
Reusable prompts to standardize common LLM interactions.
write_custom_semgrep_rule
: Return a prompt to help write a Semgrep rule
Resources
Expose data and content to LLMs
semgrep://rule/schema
: Specification of the Semgrep rule YAML syntax using JSON schemasemgrep://rule/{rule_id}/yaml
: Full Semgrep rule in YAML format from the Semgrep registry
Usage
This python package is published to PyPI as semgrep-mcp and can be installed and run with pip, pipx, uv, poetry, or any python package manager.
Standard Input/Output (stdio)
The stdio transport enables communication through standard input and output streams. This is particularly useful for local integrations and command-line tools. See the spec for more details.
Python
By default, the python package will run in stdio
mode. Because it's using the standard input and output streams, it will look like the tool is hanging without any print outs but this is normal.
Docker
This server is published to Github's Container Registry (ghcr.io/semgrep/mcp)
By default, the docker container is in SSE
mode, so you will have to include -t stdio
after the image name and run with -i
to run in interactive mode.
Server-Sent Events (SSE)
SSE transport enables server-to-client streaming with HTTP POST requests for client-to-server communication. See the spec for more details.
By default, the server wil listen on 0.0.0.0:8000/sse for client connections. To change any of this, set FASTMCP_* environment variables. The server must be running for clients to connect to it.
Python
By default, the python package will run in stdio
mode, so you will have to include -t sse
.
Docker
Semgrep AppSec Platform
To optionally connect to Semgrep AppSec Platform:
- Login or sign up
- Generate a token from Settings page
- Add it to your environment variables
- CLI (
export SEMGREP_APP_TOKEN=<token>
) - Docker (
docker run -e SEMGREP_APP_TOKEN=<token>
) - MCP Config JSONCopy
- CLI (
Tip
Please reach out to support@semgrep.com if needed. ☎️
Integrations
Cursor IDE
Add the following JSON block to your ~/.cursor/mcp.json
global or .cursor/mcp.json
project-specific configuration file:
See cursor docs for more info.
VS Code / Copilot
Click the install buttons at the top of this README for the quickest installation.
Manual Configuration
Add the following JSON block to your User Settings (JSON) file in VS Code. You can do this by pressing Ctrl + Shift + P
and typing Preferences: Open User Settings (JSON)
.
Optionally, you can add it to a file called .vscode/mcp.json
in your workspace:
Using Docker
See VS Code docs for more info.
Windsurf
Add the following JSON block to your ~/.codeium/windsurf/mcp_config.json
file:
See Windsurf docs for more info.
Claude Desktop
Here is a short video showing Claude Desktop using this server to write a custom rule.
Add the following JSON block to your claude_desktop_config.json
file:
See Anthropic docs for more info.
OpenAI
See OpenAI Agents SDK docs for more info.
Custom Clients
Example Python SSE Client
See a full example in examples/sse_client.py
Tip
Some client libraries want the URL
: http://localhost:8000/sse
and others only want the HOST
: localhost:8000
.
Try it out the URL
in a web browser to confirm the server is running and there are no network issues.
See offical SDK docs for more info.
Contributing, Community, and Running From Source
Note
We love your feedback, bug reports, feature requests, and code. Join the #mcp
community slack channel!
See CONTRIBUTING.md for more info and details how to run from the MCP server from source code.
Similar Tools 🔍
- semgrep-vscode - Official VS Code extension
- semgrep-intellij - IntelliJ plugin
Community Projects 🌟
- semgrep-rules - The official collection of Semgrep rules
- mcp-server-semgrep - Original inspiration written by Szowesgad and stefanskiasan
MCP Server Registries
Made with ❤️ by the Semgrep Team
You must be authenticated.
Tools
An MCP server that provides a comprehensive interface to Semgrep, enabling users to scan code for security vulnerabilities, create custom rules, and analyze scan results through the Model Context Protocol.
- Contents
- Getting started
- Demo
- API
- Usage
- Semgrep AppSec Platform
- Integrations
- Contributing, Community, and Running From Source