Skip to main content

View findings in Semgrep AppSec Platform

Semgrep Secrets generates a finding when a rule matches a piece of code in your codebase. You can use Semgrep AppSec Platform's Secrets page to view all of the findings generated by Semgrep Secrets after it scans your codebase.

View findings

To view your findings in Semgrep AppSec Platform:

  1. Log in to Semgrep AppSec Platform.
  2. In the Navigation bar, click Secrets.

By default, Semgrep displays your Priority findings. Priority findings are defined as valid secrets with critical or high severity.

You can switch to the All tab at any point to view all findings identified by Semgrep Secrets. Both the Priority findings view and the All findings view display high-level information about your findings. Each finding in the list includes.

Custom Priority tab

Semgrep admins can create a custom priority definition to change the findings shown on the Priority tab. To do so:

  1. Log in to Semgrep AppSec Platform.
  2. In the Navigation bar, click Code. Ensure that you're viewing the Priority.
  3. Using the provided filters, set your parameters for priority findings.
  4. Click Save.
  5. You'll see a dialog window asking you to confirm that you want the changes saved for everyone. Click Save to proceed.

This change applies to the entire Semgrep organization. You cannot have separate priority definitions for individual users or teams.

Filter findings

Regardless of whether you use the Priority findings view or the All findings view, there are multiple grouping and filtering options available to you.

Time period

The time period filters allow you to see which vulnerabilities were opened, fixed, or triaged during a certain period of time. The time period filter is not additive; it is a filter operation that precedes other filters on the page. For example, if you select Last triaged and select the status Status Open filter, no findings appear because, by definition, there are no triaged findings that are also open.

The following filters are available:

  • Triage state update action:
    • Opened in
    • Triaged in
    • Fixed in
  • Time period:
    • Last day
    • Last 7 days
    • Last 30 days
    • Last 3 months
    • Last 6 months
    • Last year
    • All time

Project

The Project filter allows you to search for findings associated with the selected projects.

Status

The Status filter allows you to search for findings in the selected statuses. See Triage status for additional information.

Additional filters

Semgrep offers additional filters that you can use to narrow down your results. The following filters are available:

FilterDescription
SeverityFilter by the severity of a finding. Severity is computed based on the values assigned for Likelihood and Impact by the rule's author. Possible values:
  • Low
  • Medium
  • High
  • Critical
Validation stateFilter by whether the secret is actively in use or not. Semgrep Secrets rules include validators, which can check whether the secret is valid for the service with which it is associated.
Secret typeFilter by the type of secret, such as private key, or the web service that makes use of the secret, such as Sendgrid or Stripe.
Repository visibilityFilter by whether the repository's visibility status.
Historical findingsFilter for findings that are valid, leaked secrets in previous Git commits.
Project tagsFilter for findings based on the tags associated with the project.
Assistant file risk levelFilter for findings based on Assistant's assessment of risk level of files based on the type of code identified. High-risk files contain sensitive information, such as authorization and authentication details, while low-risk files may be things like test files. You can further filter by file type, such as payments or tests.
Assistant autotriageFilter by whether Assistant autotriage has determined the finding to be a True positive or False positive.

Severity

Severity is assigned based on how sensitive or crucial the exposed web service is. Possible values include:

  • Critical
  • High
  • Medium
  • Low

Triage statuses

Triage is the prioritization of a finding based on policies or criteria set by your team or organization, such as severity, coding standards, business goals, and product goals.

Semgrep AppSec Platform uses the logic specified in the table below to automatically mark findings as either fixed or removed when they are no longer present in the code.

You can manually Ignore findings or set them as To fix or Reviewing in Semgrep AppSec Platform directly through triage or bulk triage actions.

The triage statuses are as follows:

StatusDescription
OpenFindings are open by default. A finding is open if it was present the last time Semgrep scanned the code and has not been ignored. An open finding represents a match between the code and a rule enabled in the repository. Open findings require action, such as rewriting the code to eliminate the detected vulnerability.
ReviewingIndicates that the finding requires investigation to determine what the next steps in the triage process should be.
Provisionally ignoredFindings where Semgrep has determined the secret to be invalid. The secret has been revoked, was never functional, or used for a custom or private endpoint that Semgrep can't communicate with.
To fixFindings that you have decided to fix. Commonly used to indicate that these findings are tracked in Jira or assigned to developers for further work.
FixedFixed findings were detected in a previous scan but are no longer detected in the most recent scan of that same branch due to changes in the code.
IgnoredFindings marked as ignored are present in the code but have been labeled unimportant. Ignore false positives or deprioritized issues. Mark findings as ignored through Semgrep AppSec Platform or by adding a nosemgrep code comment. You can also provide a reason for ignoring a finding: False positive, Acceptable risk, No time to fix.
ClosedVulnerabilities that are no longer detected after a scan. This can be due to changes in the underlying rule or the code.

Validation

Refers to whether or not a secret is active and can be used to grant resources or authentication, or if a secret is inactive.

  • Confirmed valid: Semgrep made an HTTP request using the secret, and it returned an HTTP status code of 200 or similar and some indication of valid access. For example, a service can include a "message": "ok" in the response body.
  • Confirmed invalid: Semgrep made an HTTP request using the secret and it returned an HTTP status code of 401 or similar.
  • Validation error: Semgrep made an HTTP request using the secret, but either the network request could not be made, a timeout occurred, or the HTTP status code returned a different HTTP status code. In this case, the Semgrep Team recommends manually reviewing the finding.
  • No Validator: The rule does not have a validator. The Semgrep Team recommends manually reviewing the finding.

Repository visibility

Refers to whether or not the repository is a public repository or private. This is detected through your source code manager.

Repository visibilityDescription
PublicRepository access doesn't require authentication; at a minimum, it can be viewed by anyone.
PrivateRepository access requires authentication.
UnknownSemgrep Secrets is unable to detect your repository visibility. This is typically assigned to:
  • Scans from local developer machines.
  • Scans from any non-GitHub source code manager, such as GitLab.
info

Semgrep supports visibility detection only for GitHub repositories.

Group and sort findings

By default, Semgrep displays your findings using the Group by Rule view. This view shows your findings grouped by the rule Semgrep used to match the code. Your findings are shown sorted by severity, but you can opt to sort by number of findings for a given rule.

To view findings individually, click Group & sort > No grouping. Findings are displayed based on the date they were found, with the most recent finding listed at the top.

Export findings

You can export findings to a CSV file. Semgrep can export up to 10,000 most recent findings. To export more than 10,000 findings, you must use the API.

Semgrep exports all findings to the CSV file regardless of the filters you apply on the page.

Export findings by navigating to the product page and clicking the icon near the Group & Sort filters.

Click to view a description of fields included in the CSV.
FieldDescription
IdThe unique ID number of the finding.
Rule nameThe name of the rule.
ProductThe Semgrep product. Possible values are Code, Supply Chain, or Secrets.
SeverityThe finding's severity. Possible values are Critical, High, Medium, or Low.
StatusThe finding's triage status.
Assistant componentA descriptor, such as API, Payments processing, Infrastructure, that Assistant tags the finding with, based on the code's context.
Repository nameThe name of the repository where Semgrep found the finding.
Repository URLThe repository URL.
Line of code URLThe URL to the specific line of code where the finding match began. A finding may be several lines long.
Semgrep platform linkA link to the finding's Details page in Semgrep AppSec Platform.
Created atThe time the finding was created in your timezone.
Last Opened atThe time the finding was last opened.
BranchThe name of the branch where the finding was detected.
Triaged atThe most recent time that the finding was triaged.
Triage commentA triage comment created by the user.
Triage reasonThe reason why the finding was triaged, created by the user.
Rule descriptionThe description of the rule. This is the same as the rule's message key.

The following fields are exclusive to Code scans:

FieldDescription
ConfidenceThe finding's confidence. Possible values are High, Medium, or Low.
Only Semgrep Supply Chain and Code findings provide this field.
CategoryThe finding's category, such as best practices, security, or correctness.
Is pro ruleBoolean value that returns TRUE if the rule that generated the finding is a pro rule.
Assistant triage resultProvides Semgrep Assistant's assessment. Possible values are True positive or False positive. These values appear only if Assistant is enabled.
Assistant triage reasonA short AI-generated reason why Assistant thinks the finding is a true or false positive. These values appear only if Assistant is enabled.

The following fields are exclusive to Supply Chain scans:

FieldDescription
DependencyThe name of the dependency where the findings was found.
ReachabilityThe reachability status of the finding, such as Reachable, No Reachability Analysis, or Unreachable.
TransitivityStates whether the finding originates from a direct or transitive dependency.
CVEThe CVE number that the finding is assigned to.
EPSSThe EPSS score, which estimates the likelihood that a software vulnerability can be exploited in the wild.

The following fields are exclusive to Secrets scans:

FieldDescription
Secret typePossible values include AI-detected, Generic secret, Connection URI, and so on.
ValidationStates whether or not the secret was validated.
Project visibilityStates whether the project (repository) is public or private. This feature supports GitHub-hosted repositories only. It returns an Unknown value for non-GitHub SCMs.

View details about a specific finding

To view in-depth information about a specific finding, select the finding whose details you want to view. Then:

  • If the default Group by Rule is enabled, click the Details icon on the card of the finding.
  • If the No grouping view is enabled, click the header hyperlink on the card of the finding.

The finding's details page displays in-depth information about the finding. It also allows you to perform actions such as updating the finding's status as needed, viewing links to any integrations available, such as associated Jira tickets, and communicating with your team regarding the finding. For example, you can add notes to the finding that anyone with access to the finding can see. See View findings' details for more information.

Next steps


Not finding what you need in this doc? Ask questions in our Community Slack group, or see Support for other ways to get help.