skillpack.co
All solutions

Semgrep MCP

active

Official Semgrep MCP server. Best-in-class OSS SAST with 46% vuln detection (DryRun benchmark) vs SonarQube 19%. AST-based rules are transparent and auditable. LinkedIn rebuilt their SAST pipeline around it (Feb 2026). Mindshare rising 1.6% → 2.6%.

Score 10archived
Semgrep MCP in action

Where it wins

Official MCP server — first-class agent integration

46% vuln detection in DryRun benchmark (vs SonarQube 19%) — strongest independent SAST result

AST-based rules are transparent and auditable — no black-box scanning

LinkedIn rebuilt SAST pipeline around Semgrep (Feb 2026) — enterprise validation

Mindshare rising from 1.6% to 2.6% — growing category share

OSS with commercial tier — no vendor lock-in on the core scanning engine

Where to be skeptical

DryRun benchmark shows 88% detection for DryRun's own tool — Semgrep trails on raw detection rate

MCP server is relatively new — smaller community integrations vs the main Semgrep CLI

Commercial features (Supply Chain, Secrets) require paid tier

Editorial verdict

#1 SAST skill. Best-in-class OSS SAST with official MCP server. 46% vuln detection in DryRun benchmark (vs SonarQube 19%). AST-based rules are transparent and auditable. Rising mindshare (1.6%2.6%). LinkedIn rebuilt SAST pipeline around it. The default recommendation for code scanning via AI agents.

Related

Public evidence

Raw GitHub source

GitHub README peek

Constrained peek so you can sanity-check the source material without leaving the site.

⚠️ The Semgrep MCP server has been moved from a standalone repo to the main semgrep repository! ⚠️

This repository has been deprecated, and further updates to the Semgrep MCP server will be made via the official semgrep binary.

<p align="center"> <a href="https://semgrep.dev"> <picture> <source media="(prefers-color-scheme: light)" srcset="images/semgrep-logo-light.svg"> <source media="(prefers-color-scheme: dark)" srcset="images/semgrep-logo-dark.svg"> <img src="https://raw.githubusercontent.com/semgrep/mcp/main/images/semgrep-logo-light.svg" height="60" alt="Semgrep logo"/> </picture> </a> </p> <p align="center"> <a href="https://semgrep.dev/docs/"> </a> <a href="https://go.semgrep.dev/slack"> </a> <a href="https://www.linkedin.com/company/semgrep/"> </a> <a href="https://x.com/intent/follow?screen_name=semgrep"> </a> </p>

Semgrep MCP Server

Add MCP Server semgrep to LM Studio

A Model Context Protocol (MCP) server for using Semgrep to scan code for security vulnerabilities. Secure your vibe coding! 😅

Model Context Protocol (MCP) is a standardized API for LLMs, Agents, and IDEs like Cursor, VS Code, Windsurf, or anything that supports MCP, to get specialized help, get context, and harness the power of tools. Semgrep is a fast, deterministic static analysis tool that semantically understands many languages and comes with over 5,000 rules. 🛠️

[!NOTE] This beta project is under active development. We would love your feedback, bug reports, feature requests, and code. Join the #mcp community Slack channel!

Contents

  • Semgrep MCP Server
    • Contents
    • Getting started
      • Cursor
      • ChatGPT
      • Hosted Server
        • Cursor
    • Demo
    • API
      • Tools
        • Scan Code
        • Understand Code
        • Cloud Platform (login and Semgrep token required)
        • Meta
      • Prompts
      • Resources
    • Usage
      • Standard Input/Output (stdio)
        • Python
        • Docker
      • Streamable HTTP
        • Python
        • Docker
      • Server-sent events (SSE)
        • Python
        • Docker
    • Semgrep AppSec Platform
    • Integrations
      • Cursor IDE
      • VS Code / Copilot
        • Manual Configuration
        • Using Docker
      • Windsurf
      • Claude Desktop
      • Claude Code
      • OpenAI
        • Agents SDK
      • Custom clients
        • Example Python SSE client
    • Contributing, community, and running from source
      • Similar tools 🔍
      • Community projects 🌟
      • MCP server registries

Getting started

Run the Python package as a CLI command using uv:

uvx semgrep-mcp # see --help for more options

Or, run as a Docker container:

docker run -i --rm ghcr.io/semgrep/mcp -t stdio
Cursor

Example mcp.json

{
  "mcpServers": {
    "semgrep": {
      "command": "uvx",
      "args": ["semgrep-mcp"],
      "env": {
        "SEMGREP_APP_TOKEN": "<token>"
      }
    }
  }
}

Add an instruction to your .cursor/rules to use automatically:

Always scan code generated using Semgrep for security vulnerabilities
ChatGPT
  1. Go to the Connector Settings page (direct link)
  2. Name the connection Semgrep
  3. Set MCP Server URL to https://mcp.semgrep.ai/sse
  4. Set Authentication to No authentication
  5. Check the I trust this application checkbox
  6. Click Create

See more details at the official docs.

Hosted Server

[!WARNING] mcp.semgrep.ai is an experimental server that may break unexpectedly. It will rapidly gain new functionality.🚀

Cursor

  1. Cmd + Shift + J to open Cursor Settings
  2. Select MCP Tools
  3. Click New MCP Server.
View on GitHub →