Software Alternatives, Accelerators & Startups

Semgrep VS Coveralls

Compare Semgrep VS Coveralls and see what are their differences

Semgrep logo Semgrep

Semgrep is a fast, open-source, static analysis tool for finding bugs and enforcing code standards at editor, commit, and CI time.

Coveralls logo Coveralls

Coveralls is a code coverage history and tracking tool that tests coverage reports and statistics for engineering teams.
  • Semgrep Landing page
    Landing page //
    2023-07-31
  • Coveralls Landing page
    Landing page //
    2023-01-24

Semgrep videos

Semgrep: a lightweight static analysis tool for security consultant and hackers

More videos:

  • Review - Using Semgrep and Jenkins for Static Code Analysis
  • Review - Workshop: Scaling your AppSec Program with Semgrep

Coveralls videos

High Quality Mens Work Clothing Long Sleeve Coveralls review

More videos:

  • Review - Scentlok coveralls review!

Category Popularity

0-100% (relative to Semgrep and Coveralls)
Code Analysis
39 39%
61% 61
Code Coverage
18 18%
82% 82
Security
100 100%
0% 0
Code Quality
16 16%
84% 84

User comments

Share your experience with using Semgrep and Coveralls. For example, how are they different and which one is better?
Log in or Post with

Social recommendations and mentions

Based on our record, Coveralls should be more popular than Semgrep. It has been mentiond 13 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.

Semgrep mentions (7)

  • Tree-Sitter
    > Not sure I understand your point. The problem is using Treesitter (for syntax highlighting and "semantic movements") and an LSP at the same time. So if your language has a LSP, using Treesitter additionally is redundant at best and introduces inconcistency at worst. I'm not talking about using Treesitter as the parser for the LSP. > Most popular languages have language-specific tools I'd say even less popular... - Source: Hacker News / 3 months ago
  • Powerful SAST project for Android Application Security
    This project is a compilation of Semgrep rules derived from the OWASP Mobile Application Security Testing Guide (MASTG) specifically for Android applications. The aim is to enhance and support Mobile Application Penetration Testing (MAPT) activities conducted by the ethical hacker community. The primary objective of these rules is to address the static tests outlined in the OWASP MASTG. Source: 11 months ago
  • Do you SecDevOps?
    For generally code analysis, I used Semgrep in the past. Source: over 1 year ago
  • Username/password scanner for network share
    You can try with Semgrep. For scanning shared drive you need to have the access though. Source: over 1 year ago
  • Spring Actuator - Finding Actuators using Static Code Analysis - Part 2
    For these cases, let me introduce you to my favorite static code analysis tool: semgrep. It's a free Open Source tool that you can install and use right now (it only starts costing money if you want to use their dashboard to view the results, which is entirely optional, and all code scanning runs on your device - code is never uploaded to any servers). As stated briefly, semgrep searches for code matching specific... - Source: dev.to / over 1 year ago
View more

Coveralls mentions (13)

  • GitHub Actions for Perl Development
    Cpan_coverage: This calculates the coverage of your test suite and reports the results. It also uploads the results to coveralls.io. - Source: dev.to / 4 months ago
  • Perl Testing in 2023
    I will normally use GitHub Actions to automatically run my test suite on each push, on every major version of Perl I support. One of the test runs will load Devel::Cover and use it to upload test coverage data to Codecov and Coveralls. - Source: dev.to / over 1 year ago
  • free-for.dev
    Coveralls.io — Display test coverage reports, free for Open Source. - Source: dev.to / over 1 year ago
  • Containers for Coverage
    Several years ago I got into Travis CI and set up lots of my GitHub repos so they automatically ran the tests each time I committed to the repo. Later on, I also worked out how to tie those test runs into Coveralls.io so I got pretty graphs of how my test coverage was looking. I gave a talk about what I had done. - Source: dev.to / over 1 year ago
  • Comprehensive coverage Jest+Playwright in Next.js TS
    This approach will create two json coverage files, which will be merged together by NYC. Therefore the results will be purely local. If You don't mind using online tools like Codecov or Coveralls for merging data from different tests, then go ahead and use them. They will probably also be more accurate. But if You still want to learn how to get coverage from E2E, then please read through. - Source: dev.to / almost 2 years ago
View more

What are some alternatives?

When comparing Semgrep and Coveralls, you can also consider the following products

SonarQube - SonarQube, a core component of the Sonar solution, is an open source, self-managed tool that systematically helps developers and organizations deliver Clean Code.

CodeClimate - Code Climate provides automated code review for your apps, letting you fix quality and security issues before they hit production. We check every commit, branch and pull request for changes in quality and potential vulnerabilities.

Snyk - Snyk helps you use open source and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and much more.

Cppcheck - Cppcheck is an analysis tool for C/C++ code. It detects the types of bugs that the compilers normally fail to detect. The goal is no false positives. CppCheckDownload cppcheck for free.

Codacy - Automatically reviews code style, security, duplication, complexity, and coverage on every change while tracking code quality throughout your sprints.

SensioLabs Insight - PHP Project Quality Done Right.