
-
Native Scan (
vigolium scan) — Deterministic, multi-phase vulnerability scanning. Fast, modular, and repeatable. Runs content discovery, browser spidering, SPA crawling, SAST, and active/passive audit phases with 215 scanner modules covering:- Injection — XSS (reflected, DOM-based, SSR hydration), SQL injection (error-based, boolean/time-blind), NoSQL injection, SSTI/CSTI, CRLF injection, command injection, XXE/SAML, prototype pollution
- Access Control — CSRF, IDOR, authorization bypass, mass assignment, forbidden bypass, HTTP method tampering
- File & Path — LFI, path traversal, file upload flaws, directory listing, backup/sensitive file discovery, path normalization bypass
- API & Protocol — GraphQL introspection, SSRF (direct & blind), open redirect, HTTP request smuggling, JWT vulnerabilities, JSONP callback, WebSocket security, race conditions
- Framework-Specific — Spring Boot, Django, Laravel, Rails, Express, Next.js, Nuxt, Remix, ASP.NET/Blazor, Flask, FastAPI
- CMS — WordPress (XML-RPC, user enum, AJAX exposure), Drupal, Joomla, CMS installer exposure
- Cloud & Infra — Firebase (RTDB, storage, auth, functions), cloud storage listing/takeover, default credentials, web cache poisoning, CORS misconfiguration
- Out-of-Band — Blind vulnerabilities via OAST callbacks (blind SSRF, blind SSTI, OAST probes)
-
Agentic Scan (
vigolium agent) — AI-driven scanning powered by Claude, Codex, Gemini, OpenCode, or Cursor via protocol-specific SDK integration. The agent autonomously plans attack strategies, selects modules, generates custom payloads, and triages results — with the native scan engine handling heavy lifting underneath. Two agentic scan modes: autopilot (autonomous) and swarm (targeted or full-scope with--discover), plus query mode for single-shot code review.










Key Features
Native Scan
- 215 scanner modules — 130 active (fuzzing) and 85 passive (pattern matching) modules covering OWASP Top 10 and beyond
- Out-of-band testing (OAST) — detect blind vulnerabilities (blind XSS, SSRF, command injection) via interactsh callback URLs with automatic payload correlation
- Value-aware mutation — classify parameter values by semantic type (integer, UUID, JWT, email, etc.) and generate intelligent mutations per intent (neighbor, boundary, escalation)
- Multi-phase pipeline — external harvesting, content discovery, SPA crawling, and audit controlled by strategy presets
- Scanning profiles — bundle strategy, pace, scope, and module config into a single YAML file (
--scanning-profile) - Multiple input formats — URLs, OpenAPI/Swagger, Postman, Burp Suite, cURL, Nuclei JSONL
- Browser-based spider — Chromium-driven crawler (Spitolas) with SPA support, form filling, and JS analysis
- Content discovery — adaptive directory/file enumeration engine (Deparos) with soft-404 detection
- Header injection — automatic fuzzing of existing and synthetic headers (X-Forwarded-For, X-Forwarded-Host, True-Client-IP, Referer)
- Multi-session authentication — inline sessions (
--session), session files (--session-file), or full auth configs (--auth-config) with login flows, token extraction, and IDOR/BOLA testing - JavaScript extensions — custom modules and hooks via embedded JS engine (
vigolium.http,vigolium.scan,vigolium.source) with session-aware HTTP APIs (login flows, cookie jars, CSRF extraction, auth testing, request sequencing) - Source code awareness — link repos to hostnames for source-aware scanning with
vigolium.source.*API - Concurrent architecture — configurable worker pool with per-host rate limiting and hybrid in-memory/disk/Redis queue
- HTML reports — generate self-contained HTML reports with sortable/filterable ag-grid tables (
--format html)
Agentic Scan
- Autonomous scanning (Autopilot) — AI agent autonomously discovers endpoints, runs scans, and triages findings. SDK protocol (default) provides full coding agent tools; ACP protocol uses a sandboxed terminal with command allowlisting. Supports multi-agent specialist pipeline and session resume
- AI-guided swarm (Swarm) — master agent analyzes inputs, selects scanner modules, generates custom JS attack extensions, executes scans, and triages results. Supports both targeted single-request scanning and full-scope scanning with
--discover. Includes AI code audit, native SAST (ast-grep), and batched execution for large input sets.agent pipelineis a backward-compatible alias forswarm --discover - Query mode — single-shot prompt execution for code review, endpoint discovery, and secret detection (not a scan — simple Q&A utility)
- Source-aware intelligence — when
--sourceis provided, agents run consolidated source analysis (route extraction, auth flow discovery, custom extension generation), AI code audit, and native SAST before scanning - Multiple AI backends — Claude (SDK/ACP/pipe), Codex (native/ACP), OpenCode (native/ACP), Gemini (ACP), Cursor (ACP), or custom agents via CLI or REST API (with SSE streaming)
Platform
- API server mode — REST API with Swagger UI, multi-format ingestion, transparent HTTP proxy, OpenAI-compatible agent endpoint
Installation
Quick Start — Native Scan
Server Mode
Authenticated Scanning
Vigolium supports multi-session authenticated scanning for IDOR/BOLA testing and privilege escalation checks:Agentic Scan
AI-driven scanning where agents autonomously plan, execute, and triage vulnerability assessments with the native scan engine underneath:- Autopilot — autonomous scanning with multi-agent specialist pipeline. SDK protocol (default) provides full coding agent tools; ACP protocol uses a sandboxed terminal restricted to
vigoliumcommands - Swarm — AI-guided vulnerability scanning supporting both targeted single-request and full-scope (
--discover). Master agent analyzes inputs, selects modules, generates custom JS extensions, runs code audit and SAST, executes scans, and triages results.agent pipelineis a backward-compatible alias forswarm --discover
Agent Query (Utility)
Single-shot prompts for code review, endpoint discovery, and secret detection — not a scan, just Q&A:~/.vigolium/vigolium-configs.yaml. The default backend (claude) uses the SDK protocol with full CLI tool access. Custom prompt templates go in ~/.vigolium/prompts/. See agent mode for the full guide.
Native Scan Layers
The native scan pipeline is composed of modular layers, each documented separately:| Layer | Description | Docs |
|---|---|---|
| Content Discovery (Deparos) | Adaptive directory/file enumeration with fingerprint-based soft-404 detection | Discovery |
| Browser Spider (Spitolas) | Chromium-driven state-machine crawler with CDP traffic capture | Spidering |
| SPA Scanning | Single Page Application handling with DOM mutation tracking and async API capture | SPA |
| Audit | Active/passive vulnerability scanning with insertion point extraction and DiffScan framework | Audit |
| Scanner Modules | 130 active and 85 passive modules covering OWASP Top 10 and beyond | Modules Reference |
Documentation
| Topic | Description | Link |
|---|---|---|
| Overview | Architecture, scanning paradigms, and reading guide | Overview |
| Getting Started | Install, run your first scan, and understand results | Getting Started |
| Configuration | Layered config system, profiles, and environment variables | Configuration |
| Scanning Modes | Compare all native scanning modes and strategies | Scanning Modes |
| Strategies | Lite, balanced, deep, and whitebox presets | Strategies |
| Authentication | Multi-session auth, IDOR testing, and login flows | Authentication |
| Discovery (Deparos) | Adaptive content discovery with soft-404 detection | Discovery |
| Spidering (Spitolas) | Browser-based Chromium crawler with CDP capture | Spidering |
| Audit | Active/passive vulnerability scanning with 215 modules | Audit |
| Agent Mode | AI-powered scanning with autonomous agents | Agent Mode |
| Autopilot | Autonomous AI-driven vulnerability scanning | Autopilot |
| Swarm | AI-guided targeted or full-scope scanning | Swarm |
| Server Mode | REST API server with Swagger UI and traffic ingestion | Server Mode |
| Output & Reporting | Console, JSON, JSONL, and HTML report formats | Output & Reporting |
| Writing Extensions | Custom JS modules and hooks via embedded engine | Writing Extensions |
| Whitebox Scanning | Source-aware scanning with route extraction and SAST | Whitebox Scanning |
| CI/CD Integration | Integrate Vigolium into your CI/CD pipeline | CI/CD Integration |
| REST API Reference | Full API documentation with Swagger UI | REST API Reference |
