Documentation

Everything you need to run Vigil — from quick install to MCP server configuration.

Installation

Git Clone (recommended)

git clone https://github.com/vigil-agency/vigil.git
cd vigil
cp .env.example .env
npm install
npm start
# → http://localhost:4100 (check startup logs for bootstrap password)

One-Liner

curl -fsSL https://raw.githubusercontent.com/vigil-agency/vigil/main/install.sh | bash

Prerequisites

Configuration

Copy .env.example to .env and customize:

VariableDefaultDescription
VIGIL_PORT4100Server port
VIGIL_USERadminDefault admin username
VIGIL_PASSauto-generatedBootstrap admin password (set it or read startup logs)
DATABASE_URLPostgreSQL connection (optional)
AI_PROVIDERclaude-cli or codex
ENCRYPTION_KEYauto32-byte hex for credential vault
DOCKER_HOSTDocker socket for container scanning

Docker

git clone https://github.com/vigil-agency/vigil.git
cd vigil && cp .env.example .env
docker compose up -d
# Starts Vigil + PostgreSQL 17

The Docker image includes all scanners pre-installed (nmap, nuclei, trivy, nikto, openssl, dig/whois).

Scanners

ScannerPurposeTemplates/Tests
NmapNetwork scanning, port discovery, service detection, OS fingerprinting
NucleiTemplate-based vulnerability scanning9,000+
TrivyContainer/filesystem scanning, SBOM, secrets, misconfig
NiktoWeb server misconfiguration detection6,700+
OpenSSLCertificate chain analysis, cipher grading, protocol testing
dig/whoisDNS enumeration, zone transfer, WHOIS lookup
WAF DetectionWAF/CDN fingerprinting (30+ signatures), passive and active modes30+
Code AuditLLM-driven source code vulnerability scanning + binary analysis7 vuln types

AI Integration (BYOK)

Vigil uses a Bring Your Own Key model. It shells out to CLI tools you install locally — zero AI cost for the product.

ProviderCommandRequires
Claude CLIclaude --printAnthropic subscription
Codex CLIcodexOpenAI API key
NoneAI disabled, graceful degradation

AI powers: vulnerability triage, remediation guidance, incident postmortem, compliance gap analysis, threat briefings, NL-to-scanner commands.

Agents & Campaigns

27 built-in autonomous security agents that run parallel campaigns:

MCP Server

Built-in Model Context Protocol server at POST /mcp (Streamable HTTP transport).

Connect from Claude Desktop

{
  "mcpServers": {
    "vigil": {
      "url": "http://localhost:4100/mcp",
      "transport": "streamable-http"
    }
  }
}

37 tools covering scanning, OSINT, pentesting, adversarial analysis, proxy infrastructure, compliance, incidents, and AI security assessment.

7 resources: security posture, threats, findings, code audit findings, WAF signatures, proxy nodes, AI security KB.

8 prompts: security audit, incident response, threat briefing, compliance report, code security review, WAF reconnaissance, anonymous pentest setup, AI security review.

Incident Response

Full lifecycle incident management:

Compliance

Built-in frameworks:

FrameworkControls
SOC 2Trust Service Criteria
ISO 27001Annex A controls
NIST 800-53Security controls catalog
OWASP LLM Top 10AI/LLM security (10 controls, MITRE ATLAS mapping)

Architecture

server.js              → Express + Socket.IO, auth, intervals
routes/  (~35 modules) → REST API endpoints
lib/     (~27 modules) → Scanner wrappers, AI, RBAC, crypto, engines
data/                  → JSON file stores (no DB required)
public/                → Vanilla JS frontend (37 views)
  css/                 → Vigil Dark theme (glass treatment)
  js/views/            → Self-registering ViewRegistry modules

6 npm dependencies: express, socket.io, pg, node-pty, multer, @modelcontextprotocol/sdk

37 Dashboard Views

Dashboard, Intel Hub, AI Terminal, AI Chat, MCP Playground, Security Agents, Campaigns, Pentest, Playbooks, Calendar, Notes, Git, GitHub Hub, Threat Feed, Alert Triage, Threat Hunt, Port Scanner, Vuln Scanner, Web Scanner, Container Security, SSL Monitor, DNS Security, Code Audit, Proxy Nodes, OSINT, Findings, Attack Timeline, Frameworks, Reports, Audit Log, Network, Log Analysis, Credentials, Notifications, Settings, Docs.

Auth & RBAC

Vigil Dark Theme

Glass treatment with backdrop blur. Signal system:

No green/red — all status indication uses the cyan/orange signal pair.

Roadmap

v1.1

Q2 2026

SIEM log ingestion, Slack/webhook notifications, scheduled report delivery, dark/light theme toggle, API key auth.

v1.2

Q3 2026

Multi-tenant mode, team workspaces, SSO/SAML, custom scanner plugins, Kubernetes scanning.

v2.0

Q4 2026

Cloud-hosted SaaS offering, mobile app, Google Cloud Marketplace, real-time collaborative investigations.