Vigolium’s agentic security audit is a multi-phase whitebox source-code audit driven by frontier LLMs. It reads your code, builds an architecture model, runs SAST tools, debates findings in adversarial chambers, and cold-verifies them before emitting structured results into the Vigolium database, alongside any native scanner findings. Two harnesses cover the audit surface:Documentation Index
Fetch the complete documentation index at: https://docs.vigolium.com/llms.txt
Use this file to discover all available pages before exploring further.
vigolium agent vigolium-audit: embedded driver that runs through theclaudeCLI (Claude / Codex / OpenCode). Up to 11 phases atdeep. No extra install.vigolium agent piolium: Pi-native driver. Up to 17 phases atdeep. Requires thepiruntime and thepioliumextension. Supports any provider Pi supports, including local models.
vigolium agent audit.

Prerequisites
- A working olium provider (Claude / OpenAI / Codex / local). See Setting Up the Agent.
- For
vigolium-audit, theclaudeCLI on$PATH(it ships embedded in the vigolium binary, but the harness drivesclaudeunder the hood). - For
piolium,pion$PATHpluspi install git:[email protected]:vigolium/piolium.git.
Quick Start, vigolium agent vigolium-audit
The embedded driver, fastest path to a first audit. Drives claude (or codex/opencode) against a source tree.


--source is required, the audit reads code, not network traffic. It accepts a local path, a git URL (cloned shallow by default), or an archive (.zip/.tar.gz/.tar.bz2/.tar.xz).

Audit modes
| Mode | Phases | When to use |
|---|---|---|
lite | 3 | CI/PR gates, routine triage. Quick recon, secrets scan, fast SAST. |
balanced (default) | 6 | Daily regression scans. Adds intelligence, knowledge-base, deep probe, FP review, PoC. |
deep | 11 | Pre-release / compliance audits. Adds commit archaeology, patch bypass, adversarial debate, cold verification, variant hunting. |
mock | , | Wire-up test, emits sample output without spending tokens. |
revisit / confirm / merge / diff | varies | Re-audit, validate, deduplicate, or PR-diff workflows on top of an existing audit. |
Piolium, the Pi-native alternative
piolium runs the same multi-phase audit through the Pi coding-agent runtime instead of Claude/Codex. Use it when:
- You’re on an OpenAI key (GPT-5.x, Codex) and want quality comparable to a Claude-Opus run.
- You’re using Gemini or another Vertex/Bedrock-hosted non-Anthropic model.
- You want to swap providers (
--pi-provider/--pi-model) without changing the pipeline. - You need
longshotmode, file-by-file hail-mary hunting (piolium only).
--plm-* passthroughs.
Running both, vigolium agent audit
The unified driver runs vigolium-audit and piolium back-to-back against the same source tree under one parent AgenticScan, with per-driver child rows and a post-pass project-wide findings dedup.

--driver=both, mode must be in the shared set (lite / balanced / deep / revisit / confirm / merge). Driver-specific modes (longshot/smoke for piolium, mock for vigolium-audit) require --driver=piolium or --driver=vigolium-audit.
Where findings go
Findings land in the samefindings table as the rest of Vigolium, tagged by source:
In-pipeline audit (alongside autopilot / swarm)
When you pair--source with vigolium agent autopilot or vigolium agent swarm, vigolium-audit (or piolium, when locally available) runs first, its findings feed into the operator’s frozen context bundle before the autonomous scan starts.
Next steps
- Agent Mode, full reference for every
vigolium agentsubcommand. - Setting Up the Agent, provider/credential setup.
- Agentic Scanning, autopilot and swarm modes.
