-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): update pre-commit hook returntocorp/semgrep to v1.103.0 #144
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
remi-zuffinetti
approved these changes
Oct 28, 2024
Benjamin-Freoua-Alma
approved these changes
Oct 29, 2024
3ea0d2f
to
35b86a2
Compare
35b86a2
to
dbfe80e
Compare
dbfe80e
to
556d923
Compare
556d923
to
1edbc4d
Compare
1edbc4d
to
2f6adda
Compare
2f6adda
to
3e284d6
Compare
3e284d6
to
24aa936
Compare
24aa936
to
bab1650
Compare
bab1650
to
a2a86b4
Compare
a2a86b4
to
7c8e175
Compare
|
webaaz
approved these changes
Jan 21, 2025
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v1.92.0
->v1.103.0
Note: The
pre-commit
manager in Renovate is not supported by thepre-commit
maintainers or community. Please do not report any problems there, instead create a Discussion in the Renovate repository if you have any questions.Release Notes
returntocorp/semgrep (returntocorp/semgrep)
v1.103.0
Compare Source
1.103.0 - 2025-01-15
Added
pro: taint: Support for lambdas as callbacks.
pro: python: Semgrep will now consider top-level lambdas like
x
below forinter-procedural analysis:
Changed
pip
from the Semgrep Docker image. If you need it, you may install it by runningapk add py3-pip
. (saf-1774)Fixed
with
s, like this:with (
f() as a,
g() as b,
):
pass
``` (saf-1802)
v1.102.0
Compare Source
1.102.0 - 2025-01-08
Added
Fixed
semgrep test
andsemgrep validate
commands have beencorrectly documented as EXPERIMENTAL (in semgrep --help).
Those commands are not GA yet and people should still
use the
semgrep scan --test
andsemgrep scan --validate
(orthe variants without the implicit "scan") commands (unless
they want to experiment with getting results faster and are ok
with incomplete coverage of the legacy
semgrep --test
and
semgrep --validate
). (experimental)If such a path is passed explicitly as a scanning root on the
command line, it results in an error. Otherwise if it's a file discovered
while scanning the file system, it's a warning. (saf-1776)
should now be more robust and not abort the whole scan when
an out of bound line access happens during the nosemgrep analysis
or when outputing the lines of a match. (saf-1778)
v1.101.0
Compare Source
1.101.0 - 2024-12-18
Added
Changed
semgrep ci
to allow semgrep-app to block scans based on specific findings (SECW-2740)the user to be logged in to see them.
See https://semgrep.dev/docs/semgrep-appsec-platform/json-and-sarif#json
for more information. (json)
See https://semgrep.dev/blog/2024/important-updates-to-semgrep-oss/
for more information. (rename)
the user to be logged in to see them.
See https://semgrep.dev/docs/semgrep-appsec-platform/json-and-sarif#sarif
for more information. (sarif)
Fixed
pro: Improved inter-file tracking of tainted global variables. (code-7054)
Python (pro-only): Taint now correctly tracks through calls to class methods
within a class, via the
cls
parameter.So for instance, we would be able to determine a source-to-sink
vulnerability in the following code snippet:
pro: Fixed bug when generating inter-procedural taint traces, that it could
cause a call-step to be missing in the trace. (saf-1783)
Restored the "rules" field in the SARIF output, even when logged out. (saf-1794)
v1.100.0
Compare Source
1.100.0 - 2024-12-12
Added
arity and parameter types, e.g.,
foo(x: Int, y: String)
vs.foo(x: String, y: Int)
. (code-7870)Changed
We are dropping support for Python 3.8 (python)
Fixed
pro: Fixed a bug in interprocedural index-sensitive taint analysis that caused
false negatives when a function updated an arbitrary index, e.g.:
Fixed bug affecting taint tracking through static fields when mixing accesses
using the class name and using an instance object, e.g.:
No more RPC error when using --sarif with some join-mode rules.
Moreover, regular rules without the 'languages:' field will be skipped
instead of aborting the whole scan. (gh-10723)
v1.99.0
Compare Source
1.99.0 - 2024-12-05
Fixed
the spec and not use the RFC 3339.
Thanks to Elias Haeussler for the fix. (saf-1755)
v1.98.0
Compare Source
v1.97.0
Compare Source
1.97.0 - 2024-11-19
Added
project references. (code-7677)
addition to the existing resolution for interface method invocations, this
change further enhances dataflow tracking accuracy for dynamic method
invocations. (code-7750)
Fixed
disconnection). In some cases this would previously cause a fatal error, but we
should instead be able to recover in most instances (and now can). (code-7715)
(according to git) are now scanned correctly instead of being ignored. (saf-1687)
v1.96.0
Compare Source
1.96.0 - 2024-11-07
Added
The pro engine now handles duplicate function names in C. When duplicate
functions are found, we assume that any of the duplicated functions could be
called. For example, if the function
foo
is defined in two different files,taint errors will be reported for both instances:
Changed
Fixed
of matches of sources/propagators/sanitizers/sinks within a function. (flow-83)
any gradle lockfile which did not start with a specific block comment. Now, semgrep will parse gradle
lockfiles correctly by ignoring the comment (allowing any or no comment at all to exist). (gh-10508)
the whole scan anymore (regression introduced in 1.94.0). The scan will
have an exit code of 0 instead of 2 (unless the user passed --strict in which
case it will exit with code 2). (incid-110)
unclosed braces on the same line. (saf-1667)
a character class starting with
[:
such as[:a-z]
. (saf-1693)semgrep scan
: anchored semgrepignore patterns for folders suchas
/tests
are now honored properly. Such patterns had previously noeffect of target file filtering. (semgrepignore-anchored-dirs)
v1.95.0
Compare Source
1.95.0 - 2024-10-31
Changed
--enable-experimental-requirements
flag. Functionality hasbeen always enabled since Semgrep 1.93.0. (ssc-1903)
Fixed
osemgrep
with the Pro Engine now correctly runs rules with proprietary languages (saf-1686)v1.94.0
Compare Source
1.94.0 - 2024-10-30
Fixed
pro: taint-mode: Semgrep should no longer confuse a
return
in a lambda witha
return
in its enclosing function.E.g. In the example below the return value of
foo
is NOT tainted:OCaml: matching will now recognized "local open" so that a pattern like
Foo.bar ...
will now correctly match code such aslet open Foo in bar 1
or
Foo.(bar 1)
in addition to the classicFoo.bar 1
. (local_open)Project files lacking sufficient read permissions are now skipped gracefully
by semgrep. (saf-1598)
Semgrep will now print stderr and additional debugging info when semgrep-core
exits with a fatal error code but still returns a json repsonse (finishes
scanning) (saf-1672)
semgrep ci should parse correctly git logs to compute the set of contributors
even if some authors have special characters in their names. (saf-1681)
v1.93.0
Compare Source
1.93.0 - 2024-10-23
Added
require
) in arbitraryexpression contexts. Notably, in-line use of
require
should now be linked tothe correct module. For instance, the pattern
foo.bar
should now matchagainst
require('foo').bar
and taint is likewise similarily tracked. (code-7485)semgrep ci
output now includes a list of all secrets rules whichgenerated at least one blocking finding (similar to Code) (code-7663)
--allow-dynamic-dependency-resolution
for dynamic resolution of Maven and Gradle dependencies for projects that do not have lockfiles (in Semgrep Pro only). (gh-2389)find any requirement.txt file and lockfiles in a requirements folder (**/requirements/*.txt).
The existing experimental flag
--enable-experimental-requirements
is now deprecated andwill be removed in a future release. (gh-2441)
Changed
there was no community rules added and semgrep-vue is causing linking conflicts
when compiling semgrep under Windows so just simpler to remove support for Vue.
In theory, extract mode could be a good substitute to parse Vue files. (vue)
Fixed
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR has been generated by Renovate Bot.