Overview
The/scan command performs fast static analysis security testing on source code repositories using Semgrep. It’s an alias for /raptor-scan and provides quick vulnerability detection for common security issues.
Syntax
Parameters
Absolute path to the code repository to scan
Comma-separated list of policy groups (e.g.,
secrets,owasp)Maximum number of findings to analyze (default: unlimited)
What It Does
- Runs Semgrep static analysis with OWASP and security rulesets
- Generates SARIF output files with vulnerability findings
- Saves results to
out/directory - Provides quick feedback on common security issues
Examples
Basic Scan
Targeted Policy Scan
Limited Findings
Output Structure
Use Cases
- Quick security audit of codebases
- Pre-commit security checks
- Initial vulnerability discovery
- Identifying low-hanging fruit
Related Commands
/codeql
Deeper static analysis with dataflow validation
/agentic
Full autonomous workflow including scan + analysis + exploit generation
/analyze
LLM-based analysis of scan results
/validate
Validate exploitability of findings
Notes
- Always use absolute paths for repositories
- Semgrep is faster than CodeQL but may miss complex dataflow issues
- For comprehensive analysis, use
/agenticinstead - Results are saved in SARIF format for tool integration