Skip to content

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Oct 6, 2025

Bumps semgrep from 1.113.0 to 1.139.0.

Release notes

Sourced from semgrep's releases.

Release v1.139.0

1.139.0 - 2025-09-30

Added

  • --pro-intrafile scans will now add built-in taint propagators, like --pro does, hence producing extra findings. For example, in Java, list.add(taint) will now make list tainted even if the rule does not explicitly request that. Scan times should not be generally affected in a significant way. (code-9103)
  • Scala: Enable pattern { ... } to match partial functions like { case 1 => "1" }. (code-9106)
  • Associate Containerfiles with the dockerfile language (gh-11091)

Changed

  • Rule parsing now happens solely in OCaml. This should have no change in the behavior of whether a rule successfully parses or not, but will change the parse errors emitted (#4346, #4269, #4379) (gh-4379)
  • MCP: Removed the config parameter from the semgrep_scan tools, to prevent agents from inserting unwanted config files to scan with. (saf-2258)

Fixed

  • scala: Fixed matching of { case ... => ... } patterns. (code-9111)
  • Fixed a bug preventing metavariable-comparisons with more than two subsequent "and" or "or" conditions from producing findings. For example, the condition $X > 1 or $Y > 1 or $Z > 1 would previously always evaluate to false. Now, it will behave as expected. (gh-11209)
  • MCP: Fixed an issue where the semgrep_scan tool, when invoking the RPC-based scanning approach, would return JSON output not consistent with the CLI tool. (saf-2250)
  • MCP: The semgrep_findings tool now gives a suitable error message when erring due to insufficient permissions on standard semgrep login tokens. (saf-2254)
  • MCP: Fixed a bug where if the user is already logged in when running the setup flow, the Semgrep Pro Engine installation step would be ignored. (saf-2259)

Release v1.138.0

1.138.0 - 2025-09-25

Added

  • pro: scala: Method dispatching through traits (code-9092)

Changed

  • Pro: additionally improved prefiltering for taint rules, especially when using taint labels. This allows for the generation of more specific conditions than

... (truncated)

Changelog

Sourced from semgrep's changelog.

1.139.0 - 2025-09-30

Added

  • --pro-intrafile scans will now add built-in taint propagators, like --pro does, hence producing extra findings. For example, in Java, list.add(taint) will now make list tainted even if the rule does not explicitly request that. Scan times should not be generally affected in a significant way. (code-9103)
  • Scala: Enable pattern { ... } to match partial functions like { case 1 => "1" }. (code-9106)
  • Associate Containerfiles with the dockerfile language (gh-11091)

Changed

  • Rule parsing now happens solely in OCaml. This should have no change in the behavior of whether a rule successfully parses or not, but will change the parse errors emitted (#4346, #4269, #4379) (gh-4379)
  • MCP: Removed the config parameter from the semgrep_scan tools, to prevent agents from inserting unwanted config files to scan with. (saf-2258)

Fixed

  • scala: Fixed matching of { case ... => ... } patterns. (code-9111)
  • Fixed a bug preventing metavariable-comparisons with more than two subsequent "and" or "or" conditions from producing findings. For example, the condition $X > 1 or $Y > 1 or $Z > 1 would previously always evaluate to false. Now, it will behave as expected. (gh-11209)
  • MCP: Fixed an issue where the semgrep_scan tool, when invoking the RPC-based scanning approach, would return JSON output not consistent with the CLI tool. (saf-2250)
  • MCP: The semgrep_findings tool now gives a suitable error message when erring due to insufficient permissions on standard semgrep login tokens. (saf-2254)
  • MCP: Fixed a bug where if the user is already logged in when running the setup flow, the Semgrep Pro Engine installation step would be ignored. (saf-2259)

1.138.0 - 2025-09-25

Added

  • pro: scala: Method dispatching through traits (code-9092)

Changed

  • Pro: additionally improved prefiltering for taint rules, especially when using taint labels. This allows for the generation of more specific conditions than the previously released version (v1.133.0). (code-9097)

... (truncated)

Commits
  • 984f760 chore: release version 1.139.0
  • af511d0semgrep/semgrep-proprietary#4760
  • 96b6bb9 Cron - update semgrep-rules and semgrep-rules-pro submodules (semgrep/semgrep...
  • dbba5aasemgrep/semgrep-proprietary#4755
  • 8b8f293semgrep/semgrep-proprietary#4741
  • 249f566semgrep/semgrep-proprietary#4752
  • e30fb04 chore(mcp): add anonymous_user_id to all tool calls (semgrep/semgrep-propriet...
  • 26b2ea8 feat: add scan.scan_type to semgrep.commands.ci span (semgrep/semgrep-pro...
  • 1233082 feat: record cli exit_code to semgrep.commands.ci span (semgrep/semgrep-p...
  • f88c907 fix(osemgrep test): do not pass around mutable ref in the environment (semgre...
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

@dependabot dependabot bot added dependencies Pull requests that update a dependency file python Pull requests that update Python code labels Oct 6, 2025
@dependabot dependabot bot requested a review from behnazh-w as a code owner October 6, 2025 11:54
@dependabot dependabot bot added dependencies Pull requests that update a dependency file python Pull requests that update Python code labels Oct 6, 2025
@oracle-contributor-agreement oracle-contributor-agreement bot added the OCA Verified All contributors have signed the Oracle Contributor Agreement. label Oct 6, 2025
@dependabot dependabot bot force-pushed the dependabot/pip/main/semgrep-1.139.0 branch from ab6b866 to f26a354 Compare October 9, 2025 07:58
Bumps [semgrep](https://github.com/returntocorp/semgrep) from 1.113.0 to 1.139.0.
- [Release notes](https://github.com/returntocorp/semgrep/releases)
- [Changelog](https://github.com/semgrep/semgrep/blob/develop/CHANGELOG.md)
- [Commits](semgrep/semgrep@v1.113.0...v1.139.0)

---
updated-dependencies:
- dependency-name: semgrep
  dependency-version: 1.139.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot force-pushed the dependabot/pip/main/semgrep-1.139.0 branch from f26a354 to ef784d2 Compare October 10, 2025 09:40
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file OCA Verified All contributors have signed the Oracle Contributor Agreement. python Pull requests that update Python code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants