Drew Dennison Profile Banner
Drew Dennison Profile
Drew Dennison

@drewdennison

Followers
1,350
Following
5,319
Media
7
Statuses
255
Explore trending content on Musk Viewer
@drewdennison
Drew Dennison
8 months
Amazing work by the team to harness the powerful @semgrep code analysis engine to bring secret detection and validation to our customers 🤫
@semgrep
Semgrep
8 months
📢 The Secret’s out! We’re thrilled to share that Semgrep Secrets is available for Public Beta today! Secrets leverages Semantic Analysis in addition to regex and entropy-based validation to detect secrets with high precision. Learn more →
Tweet media one
0
4
13
1
2
26
@drewdennison
Drew Dennison
3 months
It's time to stop wasting engineer's time with noise. data-driven review by @Doyensec
0
0
5
@drewdennison
Drew Dennison
10 months
. @shehackspurple welcome to the team! Super excited by your vision of AppSec excellence
@semgrep
Semgrep
10 months
We are thrilled to announce that @wehackpurple is joining forces with Semgrep! Tanya Janca, @shehackspurple , has trained thousands of AppSec professionals and built an amazing community—with Semgrep she’ll continue that great work. Read more here:
8
15
80
2
3
17
@drewdennison
Drew Dennison
2 years
Wrote React code today and our team has @semgrep running on every pull request with some custom rules our frontend lead wrote. Incredible context about how to refactor the code to meet my team's coding best practices
Tweet media one
2
2
20
@drewdennison
Drew Dennison
1 year
Great work @enncoded 👏 here’s to more technical deep dives on how to write @semgrep rules
@ermil0v
Vasilii Ermilov
1 year
@enncoded explains the difference between `pattern-not` and `pattern-not-inside` in Semgrep 👉
0
2
4
1
0
6
@drewdennison
Drew Dennison
2 years
Very excited to share the hard work of the @semgrep team—Semgrep Supply Chain launches today
2
0
12
@drewdennison
Drew Dennison
1 month
Stoked for this partnership! @jyotibansalsf was one of the first coffee chats @0xine and I had prior to founding Semgrep and it’s an honor to work together to bring security to the best developer platform
@semgrep
Semgrep
1 month
🎯 Seamless integration alert! Now, @HarnessIO users can effortlessly incorporate Semgrep's SAST solutions into their workflows, enhancing code security and accelerating development cycles. Read the details here:
1
1
4
1
2
11
@drewdennison
Drew Dennison
1 year
@IanColdwater Looking for Staff Frontend Engineers. DM me or hiring @r2c .dev to come work on @semgrep
0
1
6
@drewdennison
Drew Dennison
1 year
Amazing to see the rapid iteration of the team on this
@semgrep
Semgrep
1 year
🤖 Semgrep: now augmented with AI We’re excited to announce the private beta of Semgrep Assistant. Learn how we're using GPT to reduce noise and auto-fix bugs, making it even easier to ship secure code quickly 🧵
Tweet media one
3
17
50
0
1
8
@drewdennison
Drew Dennison
4 years
Hello world!
1
1
7
@drewdennison
Drew Dennison
4 years
@HellaSecure thanks for the invite to present! I had a lot of fun talking about Link to my slides for those interested: #HellaConf @r2cdev
1
3
8
@drewdennison
Drew Dennison
4 years
This is a startup to watch
@jeanqasaur
✨ Jean Yang ✨
4 years
🚀 APIs help things go faster 🤯 BUT APIs also cause an ever-spiraling web of dependencies At Akita, we're cleaning up the API dependency graph--using some out-there applications of PL that turn out to actually work. Would love to hear your thoughts!
4
10
29
0
1
7
@drewdennison
Drew Dennison
2 years
@rsoesemann @nawforce @semgrep @kylekyle @CopadoSolutions Apex is almost ready in @semgrep ! Would love help testing the parser on actual code
4
0
7
@drewdennison
Drew Dennison
4 years
Thanks for hosting me.
@OWASPOC
OWASP OC
4 years
Watch the first part of yesterday meetup! Guardrails for common security mistakes in Python web apps by Drew Dennison @drewdennison
0
3
7
0
0
6
@drewdennison
Drew Dennison
5 months
0
0
4
@drewdennison
Drew Dennison
4 years
Fascinating how brittle software is that array[256] instead of 255 can bring down the entire system UI
@MishaalRahman
Mishaal Rahman
4 years
According to developers @luca020400 and BadDaemon, here is why the bug occurs: The image is encoded in the "Google/Skia/E3CADAB7BD3DE5E3436874D2A9DEE126" color space (that's the full name of the color space - Skia is the name of a 2D graphics library made by Google)...
3
3
19
0
0
5
@drewdennison
Drew Dennison
4 years
@Raybeorn @HellaSecure Very excited for this to arrive! What a nice surprise 🔨
1
0
5
@drewdennison
Drew Dennison
10 months
@DominikTornow @semgrep Love seeing semgrep being used for non-security uses!
0
0
2
@drewdennison
Drew Dennison
11 months
@TaelurAlexis @semgrep Welcome to the team! Excited to work with you soon!
1
0
4
@drewdennison
Drew Dennison
4 years
@dimsuz Kotlin is in the works (Semgrep maintainer here). We have JSON and I suppose XML wouldn’t be too hard at least for the sane parts of the spec
1
0
5
@drewdennison
Drew Dennison
4 years
Congrats on the new release!
@ajinabraham
Ajin Abraham
4 years
Releasing njsscan, a cli SAST tool that finds insecure code in Node.js apps. Powered by Semantic Grep from @r2cdev libsast, a generic SAST library for writing your own static analyzer. #nodejs #devsecops #javascript #appsec
2
41
88
0
2
4
@drewdennison
Drew Dennison
4 years
Looking forward to it!
@OWASPOC
OWASP OC
4 years
In May 28th's OWASP OC @owaspoc meeting we are virtually bringing you 2 presentations: "Guardrails for common security mistakes in Python web apps" by @drewdennison and "Yes, you too can break crypto: Exploiting common crypto mistakes" by @kojenov
0
1
6
0
0
4
@drewdennison
Drew Dennison
3 years
@anantshri @DaghanAltas @bnchandrapal @semgrep Semgrep maintainer here. Semgrep is completely open-source (LGPL - think Linux). We also have ~1100 rules in a git repo that is Commons Clause license which means you can use the rules commercially but can’t resell them without attribution and permission 😊
0
1
4
@drewdennison
Drew Dennison
4 years
Excited to share what we've been up to at @r2cdev . A big thanks to everyone who has helped and inspired us on this journey 🙏
@semgrep
Semgrep
4 years
⭐ Semgrep just passed 2,000 GitHub stars, yay! 📣 Today we’re thrilled to introduce Semgrep Community and announce our Series A funding from @redpointvc and @sequoia . 🙏 Thanks to all who’ve supported us along the way. We’re grateful and humbled. More:
1
19
67
0
0
3
@drewdennison
Drew Dennison
4 years
@OwaspNagpur @r2cdev Thanks for having me!
0
0
4
@drewdennison
Drew Dennison
4 years
An amazing intern project!
@semgrep
Semgrep
4 years
🤔 What if grep had types? Our intern, Emma, explored this and added type-awareness to Semgrep. Now you can find bugs and antipatterns or enforce best practices even more precisely:
0
13
38
0
0
4
@drewdennison
Drew Dennison
4 years
Abhay is great. Recommend his training
@act1vand0
Walter Martín Villalba
4 years
OWASP Santa Barbara has teamed up with @we45 's founder @abhaybhargav to bring you a hands-on workshop on security testing automation using @zaproxy and other dynamic scanning tools. Topics include context-awareness, authN, SPAs, APIs, CI/CD integration.
2
9
11
0
1
4
@drewdennison
Drew Dennison
1 year
1
0
3
@drewdennison
Drew Dennison
4 years
Thanks for teaching us the subtleties of SQLi in Django @jacobian
@semgrep
Semgrep
4 years
When SQL injection bites, it bites hard. Here’s the creator of Django, @jacobian , on how to purge it from your app:
0
6
16
0
0
2
@drewdennison
Drew Dennison
4 years
@dgryski
Damian Gryski
4 years
go-safeweb is a collection of libraries for writing secure-by-default HTTP servers in #golang
3
21
94
1
0
3
@drewdennison
Drew Dennison
30 days
. @gdb the Semgrep team is very impressed by gpt-4o’s performance on understanding code. Incredible progress
@underyx
Bence Nagy
30 days
gpt-4o in the real world, on private benchmarks @semgrep assistant is upgrading tomorrow
Tweet media one
1
5
12
0
0
2
@drewdennison
Drew Dennison
2 years
@shaunmmaguire @figmadesign +1 to NextJS, Tailwindcss, and Vercel
0
0
3
@drewdennison
Drew Dennison
4 years
@snyff Not just speed of running, speed to iterate on false positives. Incidentally last night @yoann_padioleau investigated a perf bug in semgrep where the runtime was 3 mins - now 3.2s.
0
0
3
@drewdennison
Drew Dennison
2 years
@hendyirawan @0xine @r2cdev Does #3 work? For me it lets me sign up with any email address
Tweet media one
0
0
2
@drewdennison
Drew Dennison
3 years
@anantshri @DaghanAltas @bnchandrapal @semgrep To answer your question explicitly, yes an organization can run it on an internal instance and yes you can run it locally as both independent person and a commercial company 👍
1
0
3
@drewdennison
Drew Dennison
4 years
We’re excited to have you onboard!
@mjambon
Martin J
4 years
I joined @r2cdev a couple weeks ago! We're developing semgrep, which is a syntax-aware grep for finding/fixing problems in source code in a variety of programming languages.
1
0
17
0
0
3
@drewdennison
Drew Dennison
1 year
@leifdreizler @jrozner @twilio @segment @semgrep So excited to have you joining the team!
2
0
3
@drewdennison
Drew Dennison
2 years
@deskriders_twt @semgrep Pro-tip: you can do ['--config', 'p/python', '--config', 'p/bandit', … to avoid the 2 startup costs with 2 invocations
0
0
3
@drewdennison
Drew Dennison
2 years
@Jason is what we use
0
0
3
@drewdennison
Drew Dennison
4 years
@Darkarnium @DanHatesNumbers @dcuthbert Glad you found SARIF. We're big fans of community standards!
0
0
3
@drewdennison
Drew Dennison
4 years
. @clintgibler with autofix demo!
@Owasp_DevSlop
OWASP DevSlop 🇺🇦
4 years
On Sunday's show, @clintgibler showed us how @r2cdev 's Semgrep "autofixes" code that doesn't use approved secret services... Minds were blown! 🤯😆 Check out the full "extended" show here:
2
3
31
0
0
2
@drewdennison
Drew Dennison
4 years
@ajinabraham @r2cdev thanks for providing the very valuable early feedback
1
0
2
@drewdennison
Drew Dennison
4 years
Beyond excited to watch!
0
0
1
@drewdennison
Drew Dennison
3 years
Nice blog post @dlukeomalley
0
0
2
@drewdennison
Drew Dennison
4 years
Very excited to share what we've been working on this year!
@ProductHuntHi
Product Hunt Hi
4 years
@drewdennison FYI, you've been added as a maker of Semgrep on @ProductHunt
0
0
0
0
0
1
@drewdennison
Drew Dennison
1 year
0
0
1
@drewdennison
Drew Dennison
3 years
@anantshri @DaghanAltas @bnchandrapal @semgrep @CodeVigilant Awesome! Glad you’re using Semgrep and looking forward to seeing your php expertise. Please feel free to DM if chatting on zoom for any feedback or feature requests is helpful🙂
0
0
2
@drewdennison
Drew Dennison
2 years
@ryanelkins @semgrep Very cool! Also if you want to go really big you can run semgrep --config r/all and run everything 😎
1
0
2
@drewdennison
Drew Dennison
4 years
@_jtmelton @clintgibler @dlukeomalley @0xine Thank you for your kind words -- they mean a lot! An OSS project is nothing without its community members and I know we will learn a lot from your feedback 🙏
0
0
2
@drewdennison
Drew Dennison
4 years
@securitygen @alexjplaskett Appreciate the feedback and yep can add a flag but we’re moving to a safe metavariable comparison without having to resort to the eval escape hatch.
0
0
2
@drewdennison
Drew Dennison
4 years
@abhaybhargav We considered TOML but so far devs have been split in user interviews
1
0
2
@drewdennison
Drew Dennison
22 days
Lots of good stuff in this spring update!
@semgrep
Semgrep
22 days
Drumroll, please! 🥁 Our May quarterly launch is here, and we can’t contain our excitement! Brace yourselves for a steller lineup of new features, including Semgrep managed scanning (formerly Zero Config Scanning), RBAC, faster monorepo support, and new Semgrep Secrets
Tweet media one
0
1
3
0
0
2
@drewdennison
Drew Dennison
2 years
0
0
2
@drewdennison
Drew Dennison
4 years
@mjambon @r2cdev . @mjambon is is the genius behind the Semgrep + Tree-Sitter integration
0
0
2
@drewdennison
Drew Dennison
4 years
@empijei @connerjensen780 @dividinglimits @goinggodotnet TIL thanks. I took a first stab at the template bad types using Semgrep here:
0
0
2
@drewdennison
Drew Dennison
4 years
1
0
1
@drewdennison
Drew Dennison
4 years
0
0
1
@drewdennison
Drew Dennison
4 years
@werrett @r2cdev thanks @werrett for believing in us from the very beginning
0
0
2
@drewdennison
Drew Dennison
2 years
@_MichaelMusil @_paulshen @_paulshen see to get you started $ semgrep --autofix --config drewdennison:autofix-function-to-const
1
0
2
@drewdennison
Drew Dennison
4 years
@owenthereal @reiver Thanks for hosting me. It was a lot of fun!
1
0
2
@drewdennison
Drew Dennison
2 years
@jwhelan @rsoesemann @nawforce @semgrep @kylekyle @CopadoSolutions If you're on the community slack () there is a #lang -apex channel. See you there!
0
0
2
@drewdennison
Drew Dennison
7 days
This game is a cross between mario cart and tron 🏎️
@semgrep
Semgrep
7 days
🏎️ It’s time to put your coding skills to the test in Semgrep Speedway! Just as the Semgrep Platform champions ‘shift left’ security, this game will challenge you to navigate security hurdles with agility and precision. Are you up for the challenge?
Tweet media one
0
0
1
0
0
3
@drewdennison
Drew Dennison
20 days
. @AnthropicAI we love the 🌁🌉
@underyx
Bence Nagy
20 days
RT for Semgrep Golden Gate private beta invite
Tweet media one
0
0
3
0
0
1
@drewdennison
Drew Dennison
26 days
Does anyone have a technical contact @ForcepointSec ? I have a quick @awscloud marketplace request
0
1
2
@drewdennison
Drew Dennison
2 years
@247arjun @semgrep @AzureDevOps @semgrep OSS is distributed on both PyPI and Docker so it should be quite easy to run with Azure. Would love a contribution to probably follow the Jenkins or CircleCI example
0
0
2
@drewdennison
Drew Dennison
4 years
@Austen True for us with @DaghanAltas
0
0
2
@drewdennison
Drew Dennison
4 years
Really enjoyed reading this one
@clintgibler
Clint Gibler
4 years
📚 tl;dr sec 45 * @databricks protecting public s3 buckets * @TheDavisJam ReDoS cheatsheet * @dcuthbert “...something truly special happening in the static analysis world” * @cloudsa PrivEsc in Salesforce * @DanielMiessler attribution via reverse TM
1
1
5
1
0
2
@drewdennison
Drew Dennison
4 years
@ronperris @owasp_juiceshop Don’t know any but interested as well
0
0
2
@drewdennison
Drew Dennison
4 years
@adam_baldwin Deterministic builds and automated security patches for 3rd party deps
0
0
2
@drewdennison
Drew Dennison
7 years
Verifying myself: I am drew on Keybase.io. zw6BETh2tkp2_e3J0wYd4pIvzpDVB5um69Rl /
0
0
0
@drewdennison
Drew Dennison
4 years
@timb_machine @wireghoul @dcuthbert @r2cdev @project_harbor @yoann_padioleau was one of main contributors to Coccinelle. He's the visionary behind semgrep which aims to be a multi-language Coccinelle++
1
0
2
@drewdennison
Drew Dennison
4 years
@dgryski @njcw @nicholascwng Thanks. @njcw do you have any example code? (feel free to DM me if easier to show over Zoom). I opened this ticket if you want to follow along
1
0
1
@drewdennison
Drew Dennison
2 years
0
0
1
@drewdennison
Drew Dennison
2 years
@sean_a_cassidy @r2cdev Ha! I’m glad someone got the reference
0
0
1
@drewdennison
Drew Dennison
4 years
@Dinosn Nice blogpost!
0
0
1
@drewdennison
Drew Dennison
2 years
@PredragGruevski @r2cdev Thanks for suggesting these lint rules. Even after coding in python for 10 years I was surprised by the behavior. 🙌 to more community codifying framework sharp edges into tooling
1
0
1
@drewdennison
Drew Dennison
2 years
Wordle 214 3/6 ⬛🟩⬛🟨⬛ 🟩🟨🟨⬛⬛ 🟩🟩🟩🟩🟩
0
0
1
@drewdennison
Drew Dennison
3 years
@TristanKalos @semgrep Thanks for writing this 🙂
0
0
1
@drewdennison
Drew Dennison
3 years
@anantshri @semgrep This is an interesting use case and agreed there are often subtle (or not!) security problems in SO answers. If you're interested in writing one, I would be happy to chat and help with any API needs
1
0
1
@drewdennison
Drew Dennison
4 years
Thanks @JuliaLawall for sharing your wisdom from 15 years of patches to the Linux kernel
@semgrep
Semgrep
4 years
Yesterday we hosted @JuliaLawall from @Inria for a virtual r2c meetup where she presented, “Coccinelle, Prequel, and Spinfer: Code Evolutions in the Linux Kernel.” Julia kindly agreed to let us record the presentation and we’re sharing it with you here:
1
2
8
0
0
1
@drewdennison
Drew Dennison
4 years
0
0
1
@drewdennison
Drew Dennison
4 years
0
0
1
@drewdennison
Drew Dennison
4 years
@snyff @r2cdev I've got a bunch of examples I'm starting to triage. Lmk if you want creds to review yourself.
Tweet media one
0
0
1
@drewdennison
Drew Dennison
3 years
0
0
1
@drewdennison
Drew Dennison
4 years
@dgryski Very cool! Happy to work with you to standardize this spec
0
0
1
@drewdennison
Drew Dennison
2 years
@kentcdodds Wishing you the best recovery @kentcdodds
0
0
1
@drewdennison
Drew Dennison
2 years
0
0
1
@drewdennison
Drew Dennison
4 years
@rakingleaves @r2cdev We appreciate all of your guidance and advice!
0
0
1
@drewdennison
Drew Dennison
4 years
@abhaybhargav @abhaybhargav I attended your Dr. DevSecOps talk at Appsec Cali and was impressed with your AWS lambda architecture to build a fast code scanning pipeline. Glad you found semgrep and I liked your demo flow.
1
0
1
@drewdennison
Drew Dennison
4 years
@abhaybhargav @r2cdev and thank YOU for all the early feedback!
0
0
1
@drewdennison
Drew Dennison
3 years
@_jtmelton Whoa! Awesome 😁
0
0
1
@drewdennison
Drew Dennison
2 years
@p3pijn @andychiare @semgrep Here is a really basic starting place
0
0
1
@drewdennison
Drew Dennison
4 years
@dgryski @r2cdev Nice! I took a stab at a less verbose version using a bit of python scripting (coming soon regex on vars) and I filed for autofix support.
0
0
1
@drewdennison
Drew Dennison
3 years
0
0
1
@drewdennison
Drew Dennison
4 years
@ascohen @r2cdev It's amazing how far we've come since that dinner in cupertino. Thanks for pushing us to think harder
0
0
1