Skip to main content

Semgrep Rule Creator

Skill Verified Active

Creates custom Semgrep rules for detecting security vulnerabilities, bug patterns, and code patterns. Use when writing Semgrep rules or building custom static analysis detections.

Purpose

To empower developers and security professionals to create effective and reliable Semgrep rules for detecting vulnerabilities and code patterns.

Features

  • Guided Semgrep rule creation workflow
  • Emphasis on test-first methodology
  • Guidance on pattern matching and taint mode
  • AST analysis for precise rule writing
  • Optimization and validation steps

Use Cases

  • Writing custom Semgrep rules for specific security vulnerabilities
  • Developing rules to enforce coding standards
  • Creating taint mode rules for data flow analysis
  • Building custom static analysis detections

Non-Goals

  • Running existing Semgrep rulesets
  • General static analysis without custom rule development
  • Skipping testing or validation steps
  • Creating overly broad or generic rules

Installation

First, add the marketplace

/plugin marketplace add trailofbits/skills
/plugin install semgrep-rule-creator@trailofbits

Quality Score

Verified
100 /100
Analyzed about 11 hours ago

Trust Signals

Last commit3 days ago
Stars5.2k
LicenseCC-BY-SA-4.0
Status
View Source

Similar Extensions

Migrate Validate

100

Validate pending migrations for foreign key consistency, rollback safety, and best practices

Skill
ruvnet

Moyu (摸鱼)

100

과잉 엔지니어링 패턴이 감지되면 자동으로 활성화됩니다: (1) 사용자가 명시적으로 변경을 요청하지 않은 코드나 파일을 수정하는 경우 (2) 요청되지 않은 새로운 추상화 레이어(class, interface, factory, wrapper)를 생성하는 경우 (3) 요청되지 않은 주석, 문서, JSDoc, 타입 어노테이션을 추가하는 경우 (4) 요청되지 않은 새로운 의존성을 도입하는 경우 (5) 최소한의 편집 대신 파일 전체를 다시 작성하는 경우 (6) diff 범위가 사용자의 요청을 명백히 초과하는 경우 (7) 사용자가 "너무 많아", "거기는 건드리지 마", "X만 변경해", "간단하게", "그만" 등의 신호를 보내는 경우 (8) 발생할 수 없는 시나리오에 대한 에러 처리, 유효성 검사, 방어적 코드를 추가하는 경우 (9) 요청되지 않은 테스트, 설정 스캐폴딩, 문서를 생성하는 경우

Skill
uucz

Safe Mode

100

Prevent destructive operations using Claude Code hooks. Three modes — cautious (warn on dangerous commands), lockdown (restrict edits to one directory), and clear (remove restrictions). Uses PreToolUse matchers for Bash, Edit, and Write.

Skill
rohitg00

Fixflow

100

Execute coding tasks with a strict delivery workflow: build a full plan, implement one step at a time, run tests continuously, and commit by default after each step (`per_step`). Support explicit commit policy overrides (`final_only`, `milestone`) and optional BDD (Given/When/Then) when users ask for behavior-driven delivery or requirements are unclear.

Skill
majiayu000

Ship Gate

100

Pre-production audit that scans a codebase for security, database, deployment, code quality, AI/LLM, dependency, frontend, and observability issues. Intercepts deploy commands and blocks until critical items pass. Stack-agnostic. Use for "run ship gate", "am I ready to ship", "pre-launch audit", "can I deploy", "push to production", "go live checklist", "preflight check". Not for CI/CD setup or infra provisioning.

Skill
alirezarezvani

Semgrep

75

Run Semgrep static analysis scan on a codebase using parallel subagents. Supports two scan modes — "run all" (full ruleset coverage) and "important only" (high-confidence security vulnerabilities). Automatically detects and uses Semgrep Pro for cross-file taint analysis when available. Use when asked to scan code for vulnerabilities, run a security audit with Semgrep, find bugs, or perform static analysis. Spawns parallel workers for multi-language codebases.

Skill
trailofbits

© 2025 SkillRepo · Find the right skill, skip the noise.