Documentation Index
Fetch the complete documentation index at: https://docs.vigolium.com/llms.txt
Use this file to discover all available pages before exploring further.
Overview
Vigolium can be integrated into CI/CD pipelines to automatically scan applications for vulnerabilities on every deployment or pull request. This guide covers common patterns for running scans in automated environments.Basic CI Scan
A minimal CI scan using thelite strategy for speed and JSONL output for machine parsing:
lite strategy skips browser spidering and heavy discovery, making it suitable for time-constrained CI environments. JSONL output produces one JSON object per line, which is straightforward to parse in scripts.
Exit Codes
Check Vigolium’s exit code to determine whether findings were reported. A non-zero exit code can be used to fail a CI pipeline gate when vulnerabilities are detected. Consultvigolium scan --help for the exact exit code semantics in your version.
JSONL Output for Parsing
Usejq to filter findings by severity:
With Source Code (Agent Mode)
Source-aware analysis lives in agent mode now. When the source code is available in the CI workspace, run an AI-driven swarm with--source for route extraction and AI-generated extensions:
Agent Mode in CI
Code Review (Query)
Run an AI-powered security code review on the current source tree — single LLM call, predictable runtime:Diff-Focused Review (Autopilot)
Focus on changed code only — perfect for PR gates:Full-Scope Swarm with Discovery
For a more thorough AI-driven scan with automatic endpoint discovery:--max-duration flag ensures the scan does not run indefinitely in CI. Swarm coordinates planning, native scanning, and optional triage with --triage.
Docker
Run a scan in a container:Tips
- Keep scans fast: Use
--strategy liteand--skip spideringin CI to avoid long-running browser-based crawling. Save deep scans for staging or nightly runs. - Set timeouts: Always use
--timeoutin CI to prevent scans from blocking the pipeline indefinitely. - Cache the binary: Download and cache the Vigolium binary in your CI cache (e.g., GitHub Actions cache, GitLab CI cache) to avoid re-downloading on every run.
- Use projects: Create a dedicated project for CI scans with
vigolium project create ci-scansto keep findings organized and track trends across builds. - Incremental scanning: When scanning the same target repeatedly, previous scan data in the project can help Vigolium avoid redundant checks.
- Secrets management: Pass API keys and authentication tokens via environment variables rather than hardcoding them in CI config files. Use
--header "Authorization: Bearer $API_TOKEN"at runtime.
