Security teams that want to write and version custom SAST rules without learning CodeQL, and engineering organizations wanting open-source-first credibility with a credible commercial upgrade path. Particularly strong for buyers rejecting legacy SAST procurement.
Buyers wanting deepest semantic analysis on data-flow-heavy bugs (CodeQL better), broadest language coverage (SonarQube better), or one-vendor SAST plus DAST plus SCA bundling (Veracode or Checkmarx better).
Is Semgrep a trustworthy vendor?
- 2021-03-15r2c (Semgrep) Y Combinator W21Y Combinator-backed; founded the open-source-first credibility that defines the product line.
- 2023-11-15Semgrep AppSec Platform launchedCommercial tier expansion with managed triage, dashboards, and enterprise SSO.
- 2024-09-22Semgrep Registry passed 2,500 community rulesActive community contribution; defensible signal for open-source-first credibility.
What 340 reviews actually say
Synthesized from G2, Capterra, Reddit, Trustpilot. Patterns >15% prevalence shown.
Praise patterns
- Open-source-first credibility87% →
- Readable rule language; security teams write rules78% ↑
- Fast scan times; realistic PR-time feedback71% →
- Strong community in Semgrep Registry64% ↑
Complaint patterns
- Semantic depth lags CodeQL on data-flow-heavy bugs47% →
- Enterprise features gated to commercial tier41% →
- Smaller vendor footprint; procurement pushback at large enterprises38% →
- Documentation quality uneven on advanced rules31% →
What buyers actually pay
184 anonymized deal disclosures · last updated 2026-05-01
| Company size | Median annual |
|---|---|
| Community Edition (open-source) | $0 |
| Cloud Team (mid-market) | $4,800 |
| AppSec Platform Enterprise | $96,000 |
Auto-verified certifications
Editorial: Strengths
- Open-source-first credibility; permissively licensed Community Edition
- Readable rule language; security teams write rules without query-language overhead
- 2,500+ rules in Semgrep Registry; strong community contribution
- Fast scan times; PR-time feedback realistic
- Strong fit for security teams that want custom-rule velocity
- Y Combinator W21 backing and credible roadmap
- Excludes the false-positive overhead common to legacy SAST
Editorial: Weaknesses
- Semantic depth lags CodeQL on data-flow-heavy vulnerability classes
- Commercial product surface younger than Veracode or Checkmarx
- Enterprise features (SSO, audit, RBAC) gated to commercial tier
- Smaller vendor footprint; procurement pushback at large enterprises
- Documentation quality uneven on advanced rule features
- Pricing transparency partial; quote-only at Enterprise
Key features & integrations
- +Open-source CLI with permissive license
- +Readable Semgrep rule syntax (pattern-matching)
- +2,500+ rules in Semgrep Registry
- +PR decoration on GitHub, GitLab, Bitbucket
- +Custom-rule velocity for security teams
- +OWASP Top 10, CWE Top 25 mapping
- +IDE plugins for VS Code, IntelliJ
- +SAML SSO, audit, RBAC at Enterprise
- +REST API plus CLI
- +Active community on the Semgrep Registry
Read our full ranking of Code Quality and Static Analysis
Semgrep ranks #7 in our editorial review of 10 code quality and static analysis platforms. The deep-dive covers methodology, comparison tables, decision matrix, migration scoring, and FAQs.
Read the full rankingClosest alternatives in Code Quality and Static Analysis
Contribute your verified deal price
Pricing in B2B software is opaque because vendors want it that way. Verified buyer prices fix that, anonymously. Share what you actually paid for Semgrep; we’ll add it to the verified pricing dataset on this page (with company size band only, no identifying details).
Submit anonymously