I was at the first #bsidessf however many years ago, I’ve missed a few but it’s good to be back. I’ll be walking around or chilling at the #Semgrep booth, come say hi.

Hey developers and vulnerability researchers!

I'm currently working on improving my #Semgrep ruleset for C/C++ static code analysis, and I've just published the new v1.1.0 release: https://github.com/0xdea/semgrep-rules

Some notable changes since the previous battle-tested release: new rules for detecting high-entropy assignments and ReDoS vulnerabilities, numerous enhancements to existing rules, reduced false positives without sacrificing coverage, optimized patterns across the board, and overall better documentation. Check the changelog for the full list (yes, there’s a changelog now).

Please test it inside and out, and feel free to open issues or submit pull requests. Your feedback is invaluable and will help shape the project roadmap. I'm aiming for a major release sometime before spring.

Как мы профукали базу клиента и научились безопасности

Больше восьми лет я работал backend‑разработчиком. Мы создавали веб‑приложения для автоматизации логистики и закупок. Команда росла, процессы крепли. Всё было правильно и красиво: CI/CD, код‑ревью, споры о чистоте архитектуры и идеальном нейминге. Мир был прост, предсказуем и казалось, что так будет всегда. Но однажды утром всё изменилось. Что же случилось?

https://habr.com/ru/articles/959542/

#semgrep #dfd #DREAD #stride #безопасная_разработка

Как мы профукали базу клиента и научились безопасности

Пост о том, как в нашу компанию пришла безопасность. История показывает наши первые шаги и что нас заставило их сделать. Утечка: утро, которое всё изменило Больше восьми лет я...

Хабр

I interviewed Kim Wuyts for a #Semgrep fireside chat called Privacy by Design: Making Threat Modeling Work for Data Protection, and it was super fun!

Watch us here: https://twp.ai/4ipiK6

@KimWuyts #privacy #threatmodeling

⏰ 2 days left! Submit your CtF level for a shot at $500 worth of Semgrep prizes at AppSec Village, @defcon 33.

Enter by Aug 3: https://appsecvillage.com/ctf

#defcon33 #ctf #semgrep #appsec #sponsors #win #challenge #capturetheflag

#Semgrep static analysis tool for #code scanning at ludicrous speed 🔍

🔍 Supports 30+ languages including #Python #JavaScript #Java #Go #C #Rust #TypeScript #php and more

🛡️ Finds bugs, enforces #security guardrails and coding standards with semantic pattern matching

⚡ Runs locally by default - code never uploaded, works in #IDE, pre-commit hooks & #CI/CD workflows

🤖 #AI-powered #SemgrepAssistant provides intelligent triaging and step-by-step remediation guidance

🧵 👇

I interviewed Kim Wuyts for a #Semgrep fireside chat called Privacy by Design: Making Threat Modeling Work for Data Protection, and it was super fun!

Watch us here: https://twp.ai/4inxqU

@KimWuyts #privacy #threatmodeling

I interviewed Kim Wuyts for a #Semgrep fireside chat called Privacy by Design: Making Threat Modeling Work for Data Protection, and it was super fun!

Watch us here: https://twp.ai/4io15f

@KimWuyts #privacy #threatmodeling

GitLab CI-CD semgrep SAST (Static Application Security Test) configuration example; blocks the MR if there is any finding.

https://gitlab.com/carvilsi/sast-cicd-example

#CI_CD #sast #semgrep #gitlab #security #devops

Carvilsi [Char] / sast-cicd-example · GitLab

GitLab.com

GitLab

Current status:

#yaml #semgrep