vigolium-scanner skill (public/skills/vigolium-scanner/) with AI coding agents — Claude Code and OpenAI Codex — to operate the Vigolium CLI for web vulnerability scanning, security testing, and custom extension authoring.
Table of Contents
- What the Skill Does
- Skill Structure
- Installation
- Usage Examples by Category
- Natural Language Examples
- Tips & Best Practices
What the Skill Does
The skill teaches the AI agent how to:- Pick the right vigolium command for any security testing task
- Construct correct flag combinations with proper syntax
- Follow scanning workflows end-to-end (ingest -> scan -> triage -> export)
- Write custom JavaScript extensions using the
vigolium.*API - Operate AI agent modes (query, autopilot, swarm)
- Manage data — browse traffic, filter findings, export reports, clean databases
SKILL.md stays small, and detailed docs are loaded on demand when the agent needs deep flag information or extension authoring guidance.
Skill Structure
Installation
Option A: Install via npx / bunx (recommended)npx:
<agent-name> with your agent (e.g., claude-code, codex). This fetches the skill from the vigolium/skills repository and registers it automatically.
Option B: Clone and copy manually
scan, vigolium, agent autopilot, vulnerability scanner, openapi scan, etc. In Claude Code, you can also invoke it explicitly with /vigolium-scanner.
Usage Examples by Category
1. Scanning
Basic scan against a single target:2. Input Formats
OpenAPI 3.x spec with explicit base URL:3. Phase Control
Run only discovery (content enumeration):| Alias | Resolves To |
|---|---|
deparos, discover | discovery |
spitolas | spidering |
dynamic-assessment | audit |
ext | extension |
4. Module Filtering
List all available scanner modules:5. Server & Ingestion
Start the API server (default port 9002):6. AI Agent Modes
Agent (Template-Based)
Security code review:security-code-review— Comprehensive security reviewinjection-sinks— Find injection sinksauth-bypass— Auth bypass vectorssecret-detection— Hardcoded secretsendpoint-discovery— API endpoints from sourceapi-input-gen— Generate test inputscurl-command-gen— Generate cURL commandsattack-surface-mapper— Map attack surfacenextjs-security-audit— Next.js security reviewreact-xss-audit— React XSS auditcors-csrf-review— CORS/CSRF config audit
Agent Query (Freeform Prompt)
Inline prompt:Agent Autopilot (Autonomous Scanning)
Basic autonomous scan:- Only
vigoliumcommands are permitted (allowlist) - Destructive commands blocked (
db clean,db drop, etc.) - Shell metacharacters rejected (
;|&\``$(){}!><) - Per-command timeout: 5 minutes
- Max 100 commands by default (configurable)
- Output capped at 256KB per command
Agent Swarm (AI-Guided Multi-Phase Scan)
Basic swarm scan with discovery (all phases):Note:The swarm runs:vigolium agent pipelinestill works as a backward-compatible alias forvigolium agent swarm --discover.
- Discover — Native content discovery + spidering (no AI)
- Plan — AI analyzes discovery results, produces an attack plan
- Scan — Native executor with agent-selected modules (no AI)
- Triage — AI reviews findings, confirms/dismisses, suggests follow-ups
- Rescan — Targeted re-scanning from triage recommendations (no AI)
- Report — Structured output from database (no AI)
7. Traffic & Results Browsing
Browse all stored HTTP traffic:8. Data Management
Database statistics:9. Export & Reports
Full JSONL export:10. Whitebox / Source-Aware Scanning
Scan with local source code:11. JavaScript Extensions
Install preset examples:vigolium.agent.generatePayloads() and vigolium.agent.analyzeResponse().
YAML extension (simple pattern matching):
12. Configuration & Projects
View all configuration:Natural Language Examples
These are examples of natural language prompts you can give to Claude Code or Codex with the skill installed. The agent will translate them into the correct vigolium commands.| You Say | Agent Runs |
|---|---|
| ”Scan example.com” | vigolium scan -t https://example.com |
| ”Deep scan with spidering” | vigolium scan -t <url> --strategy deep |
| ”Import my Burp export and scan it” | vigolium scan -I burp -i export.xml |
| ”Scan my OpenAPI spec with auth” | vigolium scan -I openapi -i spec.yaml -t <url> --spec-header "Authorization: Bearer ..." |
| ”Only run XSS modules” | vigolium scan -t <url> --module-tag xss |
| ”Review my code for security issues” | vigolium agent --prompt-template security-code-review --source ./src |
| ”Autonomous scan focused on injection” | vigolium agent autopilot -t <url> --focus "injection" |
| ”Run the full AI pipeline” | vigolium agent swarm --discover -t <url> |
| ”Show me all critical findings” | vigolium finding --severity critical |
| ”Export results as HTML report” | vigolium export --format html -o report.html |
| ”What traffic is in the database?” | vigolium traffic |
| ”Write me an extension that checks for exposed .env files” | Generates a JS extension file |
| ”Start the server with auto-scan” | vigolium server -t <url> --scan-on-receive |
| ”Whitebox scan with my source code” | vigolium scan -t <url> --source ./src --strategy whitebox |
| ”Clean up old scan data” | vigolium db clean --before <date> --force |
Tips & Best Practices
- Start with
scan -t— It’s the most common command. Add flags incrementally. - Use strategies —
litefor quick checks,balancedfor most cases,deepfor full coverage,whiteboxwhen you have source code. - Phase isolation — Use
--onlyorvigolium run <phase>to iterate on a single phase without re-running the entire pipeline. - Module tags — Filter modules by technology (
spring,nodejs) or vulnerability class (xss,injection) to reduce noise. - Watch mode — Add
--watch 5stotraffic,finding, ordb statsfor real-time monitoring during long scans. - Dry-run agents — Always
--dry-runfirst for agent commands to preview prompts before spending AI tokens. - Swarm over autopilot — Use
agent swarm --discoverfor structured scans (lower cost, reproducible). Useagent autopilotfor exploratory, creative scanning. - Extensions for custom logic — Write JS extensions instead of modifying core modules. They run alongside built-in modules with
--ext. - Projects for isolation — Use
vigolium project createto keep scan data separate across engagements. - Export early — Run
vigolium export --format html -o report.htmlto share results as interactive reports.
