Skip to main content

Overview

Vigolium’s agent mode uses AI to drive vulnerability scanning. There are three execution modes with increasing autonomy: Query for single-shot analysis, Swarm for AI-planned targeted scanning, and Autopilot for fully autonomous multi-class assessments. A fourth command, Pipeline, is a convenience alias for swarm --discover.

Prerequisites

Agent mode requires an AI backend. The default backend is Claude (via the Agent SDK). Verify it’s available:
vigolium agent --list-agents
To use a different backend, pass --agent <name> (e.g., --agent gemini, --agent opencode).

Query: Single-Shot Analysis

Query runs a single AI prompt and returns structured output. No network scanning — useful for code review, endpoint discovery, and secret detection.

With a Built-in Template

vigolium agent query --prompt-template security-code-review --source ./app
List available templates:
vigolium agent --list-templates

With an Inline Prompt

vigolium agent query -p "Find all API endpoints that accept user input without validation" --source ./app

With Specific Files

vigolium agent query \
  --prompt-template security-code-review \
  --source ./app \
  --files src/auth/login.go,src/auth/session.go

Saving Output

vigolium agent query \
  --prompt-template endpoint-discovery \
  --source ./app \
  --output endpoints.json

Swarm: AI-Planned Targeted Scanning

Swarm is the primary agentic scan mode. A master AI agent analyzes your input, selects scanner modules, generates custom JavaScript extensions, and executes the scan.

Scanning a Specific Request

Pass a target request via --input (accepts URLs, curl commands, raw HTTP, Burp XML, or base64):
# From a URL
vigolium agent swarm \
  --input "https://example.com/api/users?id=1" \
  -t https://example.com

# From a curl command
vigolium agent swarm \
  --input "curl -X POST -H 'Content-Type: application/json' -d '{\"user\":\"admin\"}' https://example.com/api/login" \
  -t https://example.com

# From a file
vigolium agent swarm \
  --input @request.txt \
  -t https://example.com

Full-Scope Scanning with Discovery

Add --discover to run content discovery and spidering before the AI planning phase:
vigolium agent swarm \
  --discover \
  -t https://example.com
This is equivalent to using the pipeline command:
vigolium agent pipeline -t https://example.com

Source-Aware Scanning

Provide application source code for deeper analysis. The AI agent analyzes routes, auth flows, and generates targeted extensions:
vigolium agent swarm \
  --source ./app \
  -t https://example.com \
  --discover
For a deep AI-driven code audit on top of scanning:
vigolium agent swarm \
  --source ./app \
  -t https://example.com \
  --code-audit

Focusing on a Vulnerability Type

vigolium agent swarm \
  --input "https://example.com/api/users?id=1" \
  -t https://example.com \
  --vuln-type sqli

Enabling Triage

By default, swarm outputs raw findings. Add --triage for AI-powered true/false positive classification with automatic rescan:
vigolium agent swarm \
  --input "https://example.com/api/users?id=1" \
  -t https://example.com \
  --triage \
  --max-iterations 3

Swarm Phases

The swarm pipeline runs these phases in order:
PhaseTypeDescription
native-normalizeNativeParse and normalize input
source-analysisAIRoute extraction from source code (if --source)
code-auditAIDeep security code audit (if --code-audit)
native-sastNativeStatic analysis (if --source)
sast-reviewAIValidate SAST findings
native-discoverNativeDiscovery + spidering (if --discover)
planAIMaster agent plans the attack
native-extensionNativeWrite generated JS extensions
native-scanNativeExecute the planned scan
triageAIClassify findings (if --triage)
native-rescanNativeTargeted rescan on follow-ups
Skip or start from a specific phase:
# Skip source analysis and SAST
vigolium agent swarm -t https://example.com --skip source-analysis --skip native-sast

# Resume from the plan phase
vigolium agent swarm -t https://example.com --start-from plan

Pipeline: Full-Scope Alias

Pipeline is a backward-compatible alias for swarm --discover. Use it when you want a full-scope agentic scan:
vigolium agent pipeline -t https://example.com
With source code:
vigolium agent pipeline -t https://example.com --source ./app
With a timeout:
vigolium agent pipeline -t https://example.com --timeout 2h

Autopilot: Autonomous Multi-Class Assessment

Autopilot runs a 5-phase specialist pipeline that autonomously scans for multiple vulnerability classes in parallel:
vigolium agent autopilot -t https://example.com

Phases

  1. Recon - map the attack surface (endpoints, tech stack, auth flows)
  2. Vulnerability Analysis - parallel specialists identify potential vulns per class
  3. Native Scan - execute targeted scans based on analysis
  4. Exploit Verification - confirm findings with proof-of-concept attempts
  5. Report - generate a structured security report

Selecting Specialists

By default, autopilot runs all specialists. Focus on specific vulnerability classes:
vigolium agent autopilot -t https://example.com \
  --specialists injection,xss,auth
Available specialists: injection, xss, auth, ssrf, authz.

With Source Code

vigolium agent autopilot -t https://example.com --source ./app

With a Focus Area

vigolium agent autopilot -t https://example.com --focus "authentication bypass"

Resuming a Session

Autopilot supports checkpointing. If interrupted, resume from where it left off:
vigolium agent autopilot --resume ~/.vigolium/agent-sessions/agt-abc123-def456

Timeout and Limits

vigolium agent autopilot -t https://example.com \
  --timeout 2h \
  --max-commands 50

Session Management

All agent runs create session directories under ~/.vigolium/agent-sessions/. Browse past sessions:
# List all sessions
vigolium agent session

# Filter by mode
vigolium agent session --mode swarm

# View a specific session
vigolium agent session <uuid>

Custom Instructions

Append custom guidance to any agent prompt:
vigolium agent swarm \
  -t https://example.com \
  --instruction "Focus on the /api/v2 endpoints. The app uses JWT auth with RS256."
Or load from a file:
vigolium agent swarm \
  -t https://example.com \
  --instruction-file context.md

Dry Run and Prompt Inspection

Preview the rendered prompt without executing:
vigolium agent swarm --dry-run \
  --input "https://example.com/api/users?id=1" \
  -t https://example.com
Print the prompt to stderr while executing:
vigolium agent swarm --show-prompt \
  --input "https://example.com/api/users?id=1" \
  -t https://example.com

Choosing the Right Mode

ModeAI CallsBest For
Query1Code review, endpoint discovery, CI checks
Swarm2-4+Targeted request scanning, focused testing
Pipeline5-6+Full-scope structured scanning
AutopilotMany (parallel)Deep autonomous assessment, multi-class testing