Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.vigolium.com/llms.txt

Use this file to discover all available pages before exploring further.

Archon-audit is Vigolium’s embedded multi-phase whitebox security audit engine, running on Claude Code, Codex, or OpenCode. In swarm it runs as a background process alongside the main scan; in autopilot it runs first, then its output is prepared into stable operator context before the autonomous agent starts. As a foreground subcommand it runs through vigolium agent archon. Findings are automatically ingested into the Vigolium database alongside native scanner results.
Pi-native alternative: piolium is the same multi-phase audit running on the Pi runtime (OpenAI/Codex, Gemini, etc.). It shares this page’s on-disk schema and finding format. To run both harnesses on the same source tree under one AgenticScan with a post-pass findings dedup, use the unified vigolium agent audit driver (POST /api/agent/run/audit with driver: "both").
Archon-audit replaces the legacy vig-audit-agent with richer finding formats (YAML frontmatter, adversarial verdicts, cold-verify overlays) and a more capable multi-phase pipeline.

Quick Start

# Swarm with background archon-audit (lite mode, default)
vigolium agent swarm -t https://example.com --source ./src --archon

# Swarm with deep 10-phase audit
vigolium agent swarm -t https://example.com --source ./src --archon deep

# Autopilot with archon-audit first
vigolium agent autopilot -t https://example.com --source ./src --archon balanced

# Explicitly disable (overrides config)
vigolium agent swarm -t https://example.com --source ./src --archon off

# Run archon directly as a foreground command
vigolium agent archon --source ./src --mode deep --agent claude

# Import previously-run archon output
vigolium import /path/to/archon-output/
Archon-audit requires --source — it audits source code, not network traffic.

How It Works

When --archon is set and --source is provided:
  1. Vigolium extracts the embedded archon-audit harness (agents, commands, skills) to ~/.vigolium/archon-audit/
  2. A separate Claude Code (or Codex/OpenCode) process is launched with the archon plugin, targeting the source directory
  3. The archon agent runs its own multi-phase pipeline independently
  4. Audit state and findings are copied into the Vigolium session directory
  5. Progress is tracked in a child AgenticScan record (mode=archon) linked to the parent run
  6. When the audit completes, findings are parsed and ingested into the Vigolium database
  7. In autopilot, archon output is then prepared into stable context and a native plan before the operator starts
  8. The <source>/archon/ directory is removed (copy preserved in session directory)
  9. If a foreground run is cancelled first, the archon process is gracefully cancelled via SIGTERM (10s grace period)
+---------------------------------------------------------------+
|                  vigolium agent swarm/autopilot                |
|                                                                |
|  +--------------+    +-------------------------------------+  |
|  |  Foreground  |    |  Background (separate process)      |  |
|  |              |    |                                     |  |
|  |  Swarm/      |    |  claude --plugin-dir <archon>       |  |
|  |  Autopilot   |    |  /archon-audit:archon:{mode}        |  |
|  |  Pipeline    |    |                                     |  |
|  |              |    |  P1:  Commit Archaeology            |  |
|  |  normalize   |    |  P2:  Patch Bypass Analysis         |  |
|  |  source-     |    |  P3:  Knowledge Base + Threat Model |  |
|  |   analysis   |    |  P4:  Static Analysis (CodeQL+Sg)   |  |
|  |  code-audit  |    |  P5:  Deep Probe + Bug Hunting      |  |
|  |  discover    |    |  P6:  Spec Gap Analysis             |  |
|  |  plan        |    |  P7:  Enrichment + Filtering        |  |
|  |  scan        |    |  P8:  Adversarial Debate Chambers   |  |
|  |  triage      |    |  P9:  Cold Verification             |  |
|  |              |    |  P10: Variant Hunting               |  |
|  |              |    |  P11: PoC + Report Assembly         |  |
|  |              |    |                                     |  |
|  |              |    |  -- state sync every 30s -->        |  |
|  |              |    |  -- findings ingested on done -->   |  |
|  +-------+------+    +------------------+------------------+  |
|          |                              |                     |
|          v                              v                     |
|  +-----------------------------------------------------+      |
|  |                     Database                         |      |
|  |  findings (source: scanner modules + archon)        |      |
|  |  http_records, agentic_scans                        |      |
|  +-----------------------------------------------------+      |
+---------------------------------------------------------------+

Audit Modes

Lite (3 phases)

Fast pipeline optimized for CI/CD and routine scans. Runs quick recon, secrets scan, and fast SAST.
PhaseNameDescription
Q0Quick ReconArchitecture inventory, dependency audit
Q1Secrets ScanCredential and secret detection
Q2Fast SASTQuick CodeQL + Semgrep structural scan

Balanced / Scan (6 phases)

Intermediate audit with SAST, probing, and validation.
PhaseNameDescription
1IntelligenceCVE/GHSA/OSV hunting, dependency audit, architecture inventory
2Knowledge BaseThreat model, domain attack research, RFC specs
3SASTCodeQL structural + security scan, Semgrep (parallel with P4)
4ProbeTargeted deep analysis of high-risk areas (parallel with P3)
5Review + FPInline verification + false positive elimination
6PoC + ReportProof-of-concept generation and advisory-style report

Deep (11 phases)

Comprehensive audit with adversarial review chambers. Best for pre-release audits, compliance, or high-value targets. The legacy full mode maps to deep.
PhaseNameDescription
P1Commit ArchaeologyAnalyze git history for silent security fixes, undisclosed CVEs
P2Patch BypassTest patch completeness, find alternate exploitation paths
P3Knowledge BaseBuild architecture model, trust boundaries, attack surface map
P4Static AnalysisCodeQL + Semgrep with custom rules
P5Deep ProbeMulti-hypothesis probing with specialized agents
P6Spec Gap AnalysisFind gaps between spec/docs and implementation
P7Enrichment & FilteringEnrich SAST findings with reachability analysis and data flow
P8Adversarial DebateMulti-agent debate chambers validate/disprove findings
P9Cold VerificationIndependent zero-context re-verification
P10Variant HuntingSearch for variants of confirmed vulnerabilities
P11Report AssemblyPoC building and advisory-style final report

CLI

--archon flag (swarm and autopilot)

Available on both vigolium agent swarm and vigolium agent autopilot.
ValueBehavior
(not set)Disabled (unless enabled in config)
--archonLite mode (3-phase fast audit)
--archon liteLite mode (explicit)
--archon balancedBalanced mode (6-phase intermediate audit)
--archon deepDeep mode (10-phase comprehensive audit)
--archon mockSample output mode (for testing wiring without spending tokens)
--archon offDisabled (overrides config)

Foreground command: vigolium agent archon

Run archon-audit standalone, not as a child process of swarm/autopilot:
vigolium agent archon --source ./src --mode deep --agent claude

# Specific revisit / confirm / merge / diff sub-modes
vigolium agent archon --source ./src --mode revisit
vigolium agent archon --source ./src --mode confirm
vigolium agent archon --source ./src --mode diff

# Use a different agent CLI
vigolium agent archon --source ./src --mode lite --agent codex

# Stream off (capture to file only)
vigolium agent archon --source ./src --mode deep --no-stream
FlagDescription
--sourceSource path or git URL (cloned to a temp dir)
--modelite / balanced / deep / revisit / confirm / merge / diff / status / mock
--agentAgent CLI: claude (default), codex, opencode
--no-streamDisable terminal streaming

Examples (swarm / autopilot)

# Swarm: targeted scan + background lite audit
vigolium agent swarm \
  -t https://example.com/api \
  --source ./backend \
  --archon

# Swarm: full-scope scan + deep audit
vigolium agent swarm \
  -t https://example.com \
  --source ./backend \
  --discover \
  --archon deep

# Autopilot: autonomous scan + balanced-mode audit
vigolium agent autopilot \
  -t https://example.com \
  --source ./backend \
  --archon balanced

# Disable archon even if config enables it
vigolium agent swarm \
  -t https://example.com \
  --source ./backend \
  --archon off

API

The archon field is available on both the swarm and autopilot run endpoints.
FieldTypeDescription
archonstring"lite", "balanced", "deep", "mock", "off", or omit for config default
# Swarm with lite archon-audit
curl -s -X POST http://localhost:9002/api/agent/run/swarm \
  -H "Content-Type: application/json" \
  -d '{
    "input": "https://example.com",
    "source": "/home/user/src/my-app",
    "discover": true,
    "archon": "lite"
  }' | jq .

# Autopilot with deep archon-audit
curl -s -X POST http://localhost:9002/api/agent/run/autopilot \
  -H "Content-Type: application/json" \
  -d '{
    "target": "https://example.com",
    "source": "/home/user/src/my-app",
    "archon": "deep"
  }' | jq .
Both endpoints return 202 Accepted with a run ID. Archon-audit runs as a background process within the agent run — its progress is tracked in a child AgenticScan record. Findings are ingested into the database on completion.
# Query archon findings after run completes
curl -s 'http://localhost:9002/api/findings?source=archon' | jq .

Manual Import

Archon output from external runs can be imported directly without running swarm or autopilot:
vigolium import /path/to/archon-output-harbor/
The folder must contain audit-state.json and findings/. The import:
  1. Parses audit-state.json for phase tracking and metadata
  2. Reads all finding files from findings/
  3. Applies cold-verify overlays (if *.cold-verify.md files exist)
  4. Creates an AgenticScan record (mode=archon)
  5. Saves findings with deduplication (skips duplicates by finding hash)
  6. Reports counts: total findings, saved, duplicates skipped, severity distribution

Configuration

agent:
  archon:
    enable: false              # Enable by default (overridable with --archon off)
    mode: lite                 # Default mode: lite, balanced, or deep
    platform: claude           # Agent CLI: claude, codex, or opencode
    plugin_dir: ""             # Custom harness path (default: ~/.vigolium/archon-audit/)
    sync_interval: 30          # Seconds between state syncs

Precedence

  1. CLI --archon <value> / API "archon": "<value>" — highest priority
  2. Config agent.archon.enable: true — used when CLI/API doesn’t specify
  3. --archon off / "archon": "off" — overrides config

Harness Resolution

The archon-audit harness (agents, commands, skills) is resolved in this order:
  1. Config plugin_dir — if set and exists, used directly
  2. Default path ~/.vigolium/archon-audit/ — checked next
  3. Embedded extraction — if neither exists, the harness bundled in the Vigolium binary is extracted automatically. A version hash marker detects changes for re-extraction
No manual installation is required — everything ships embedded in the Vigolium binary.

Session Artifacts

Archon-audit writes output to the source directory under archon/, which is synced to the session directory.

Source Directory (temporary, removed after import)

<source_path>/
└── archon/
    ├── audit-state.json              # Phase progress tracking
    ├── findings/                     # Per-finding markdown files
    │   ├── p7-001-open-redirect.md   # Phase 7 finding
    │   ├── p8-001-ssrf-webhook.md    # Phase 8 finding
    │   ├── p8-001-ssrf.cold-verify.md  # Cold verification overlay
    │   ├── p10-041-variant.md        # Variant finding
    │   └── ...
    ├── knowledge-base-report.md
    ├── final-audit-report.md
    ├── advisory-report.md
    ├── spec-gap-report.md
    └── attack-pattern-registry.json

Session Directory (persistent)

~/.vigolium/agent-sessions/<uuid>/
├── archon-audit/                     # Synced from source
│   ├── audit-state.json
│   ├── findings/
│   ├── final-audit-report.md
│   ├── attack-pattern-registry.json
│   └── ...
├── archon-audit-output.md            # Raw agent process output
├── audit-stream.jsonl                # Streaming agent events
├── output.md                         # Main agent output
└── runtime.log

Finding Format

Archon produces two finding formats depending on the phase.

Phase 7 Findings (Table-based)

Early-phase findings use a markdown table format:
# Phase 7 Enriched Finding: P7-001

## Finding Details

| Field | Value |
|-------|-------|
| **Finding ID** | P7-001 |
| **Title** | Open Redirect via Unvalidated postURI |
| **Severity** | HIGH |
| **Confidence** | HIGH |
| **CWE** | CWE-601 (URL Redirection to Untrusted Site) |

PoC-Status: theoretical

## Code Location

**File**: `src/core/controllers/authproxy_redirect.go`
**Lines**: 73-77

[Detailed analysis...]

Phase 8+ Findings (Frontmatter-based)

Later-phase findings use structured key-value frontmatter with adversarial verdicts:
Phase: 8
Sequence: 001
Slug: admin-db-auth-brute-force
Verdict: VALID
Severity-Original: HIGH
Severity-Final: MEDIUM
PoC-Status: pending
Adversarial-Verdict: CONFIRMED
Adversarial-Rationale: IsSuperUser forces DB auth unconditionally...

## Summary

Harbor's admin account bypasses account lockout...

## Location

- `src/core/auth/authenticator.go:142`
- `src/core/auth/lock.go:22-51`

[Full analysis with evidence...]

Cold-Verify Overlays

Phase 9 cold verification produces overlay files (*.cold-verify.md) that enhance base findings with independent verdicts. The overlay updates adversarial verdict and severity, and appends a “Cold Verification” section to the finding body.

Finding Ingestion

When the audit completes, findings are automatically parsed and stored in the Vigolium database.
Archon FieldDatabase FieldExample
Finding IDmodule_idarchon:p8-001
Titlemodule_nameSSRF via Webhook Job Address
Slugmodule_shortssrf-webhook-job
Severity (final)severityhigh (normalized)
Verdictconfidencefirm (CONFIRMED/VALID) or tentative
CWEcwe_idCWE-918
Full analysisdescriptionMarkdown body with evidence
First locationsource_filesrc/jobservice/webhook_job.go
All locationsmatched_atsrc/jobservice/webhook_job.go:103-120
Metadatatags["archon", "phase-8", "valid", "poc-theoretical", "CWE-918"]
All findings are stored with:
  • finding_source: archon
  • module_type: whitebox
  • finding_hash: MD5(auditID + moduleID + findingID) for deduplication

Confidence Mapping

Archon VerdictDatabase Confidence
CONFIRMED, VALIDfirm
All others (POSSIBLE, UNLIKELY, etc.)tentative

Querying Archon Findings

# Via CLI
vigolium finding list --source archon

# Via API
GET /api/findings?source=archon

Architecture

Specialized Agents (24 total)

The archon-audit engine uses a team of specialized agents, each handling a specific aspect of the audit:
AgentPhaseRole
advisory-hunterP1CVE/GHSA/OSV intelligence gathering
commit-archaeologistP1Git history analysis for silent fixes
patch-bypass-checkerP2Bypass analysis for identified patches
knowledge-base-builderP3Threat model + architecture mapping
static-analyzerP4SAST tool coordination (CodeQL, Semgrep)
probe-strategistP5Multi-model hypothesis generation
code-anatomistP5Code structure analysis
backward-reasonerP5Reverse-engineer attack paths
contradiction-reasonerP5Spot logical inconsistencies
causal-verifierP5Validate causality claims
evidence-harvesterP5Build proof from code evidence
enrichment-filterP6-7Finding classification by exploitability
spec-gap-analystP6-7RFC/spec compliance gap detection
chamber-synthesizerP8Debate moderator for adversarial review
attack-ideatorP8Exploit brainstorming
code-tracerP8Deep code path tracing
devils-advocateP8Challenge assumptions
variant-scoutP8Initial variant identification
cold-verifierP9Independent zero-context verification
variant-hunterP10Deep variant analysis across codebase
poc-builderP11Proof-of-concept generation
report-assemblerP11Final report assembly

Adversarial Review Chambers (Phase 8)

The deep mode’s adversarial debate phase uses a structured format where specialized agents argue for and against the exploitability of each finding:
probe-strategist --> generates hypotheses
         |
         +-- attack-ideator (brainstorms exploits)
         +-- backward-reasoner (reverse-engineers paths)
         +-- evidence-harvester (builds proofs)
         |
         +-- chamber-synthesizer (moderates debate)
                  |
                  +-- devils-advocate (challenges claims)
                  +-- contradiction-reasoner (spots inconsistencies)
                  +-- causal-verifier (validates causality)
Only findings that survive this adversarial process proceed to cold verification and the final report. This dramatically reduces false positives compared to single-pass analysis.

Cold Verification (Phase 9)

After the adversarial debate, the cold-verifier agent performs an independent, zero-context re-verification of each finding. It receives no prior verdicts or rationale — only the raw code and finding description. Cold verification overlays update the base finding with an independent severity assessment and verdict, providing a second opinion that catches debate-phase groupthink.

Comparison with Native Scanning

AspectVigolium Native (Swarm/Autopilot)Archon-Audit
FocusNetwork vulnerabilities (injection, XSS, SSRF, etc.)Source code vulnerabilities (logic flaws, auth gaps, spec violations)
MethodLive HTTP scanning with payloadsStatic analysis + AI reasoning + adversarial validation
False positive handlingAI triage phaseMulti-layer: adversarial debate chambers + cold verification
Finding richnessStandard severity/confidenceAdversarial verdicts, cold-verify overlays, CWE, PoC status
SpeedMinutes to hoursMinutes (lite) to hours (deep)
RequiresTarget URLSource code path
Runs asForeground (main pipeline)Background (separate process)
The two approaches are complementary. Network scanning finds vulnerabilities that manifest in HTTP responses; archon-audit finds vulnerabilities that require understanding code semantics, business logic, and specification compliance. Running both together provides the most comprehensive assessment.