SkillAgentSearch skills...

Vigilo

An AI hacker for Web3 Smart Contract. for bug bounties, Audit contest, offensive security research, and real-world exploit thinking.

Install / Use

/learn @PurpleAILAB/Vigilo
About this skill

Quality Score

0/100

Supported Platforms

Claude Code
Claude Desktop

README

<p align="center"> <img src=".github/assets/logo.png" alt="Vigilo"> </p> <h1 align="center">Vigilo</h1> <p align="center"> <strong>Web3 Smart Contract Security Auditing Agent</strong> </p> <p align="center"> From Latin <em>vigilo</em> — "I watch, I guard." An autonomous security legion inspired by the command structure of the Roman army, watching over your smart contracts to find vulnerabilities before attackers do. </p> <div align="center">

npm version GitHub Release GitHub Stars GitHub Issues License

</div>

What is Vigilo?

Vigilo is an autonomous security legion for smart contract auditing, inspired by the command structure of the Roman army. It runs inside OpenCode, deploying specialized agents in parallel to find vulnerabilities and generate validated PoCs.

The Legion

| Agent | Mission | |-------|---------| | Vigilo | Orchestrates the full audit pipeline | | Quaestor | Pre-audit interview & scope planning | | Explorator | Code reconnaissance — maps structure and flows | | Speculator | Documentation intel — extracts design and invariants | | Centuriones | 8 specialist auditors deployed by protocol type |

<p align="center"> <img src=".github/assets/opencode.png" alt="Vigilo running in OpenCode" width="720"> </p>

Proven in the Wild

Real vulnerabilities found by Vigilo in live audit contests.

All I did was specify the target project and submit the report. Vigilo did the rest.

<p align="center"> <a href="./findings/cantina-rounding-accumulation.md"> <img src=".github/assets/findings/cantina-rounding-accumulation.png" alt="Cantina High Severity Finding" width="600"> </a> </p> <p align="center"> <em>Cantina — Ceiling Rounding Accumulation (High, Accepted)</em> <br> <a href="./findings/cantina-rounding-accumulation.md">View full report</a> </p>

Installation

OpenCode

For LLM Agents (Recommended)

Paste this into your LLM agent session:

Install and configure vigilo by following the instructions here:
https://raw.githubusercontent.com/PurpleAILAB/Vigilo/main/packages/opencode/docs/installation.md

Manual Install

bunx vigilo install

Claude Code

/plugin marketplace add PurpleAILAB/Vigilo
/plugin install vigilo@Vigilo

See the full Installation Guide for more options.

Uninstallation

  1. Remove the plugin from your OpenCode config:
# Edit ~/.config/opencode/opencode.json and remove "vigilo" from the plugin array
  1. Remove configuration files:
rm -f ~/.config/opencode/vigilo.json
  1. Verify removal:
opencode --version

Features

  • Automated Audit Workflow: Scope → Recon (Exploratores) → Deep Analysis (Centuriones) → PoC → Report
  • Specialized Auditors: Reentrancy, Oracle, Access Control, Flashloan, Logic, DeFi, Token, Cross-Chain
  • Multi-Language Support: Solidity, Vyper, Cairo, Rust
  • Foundry Integration: forge build, forge test, forge coverage
  • LSP Integration: Goto-definition, references, diagnostics
  • Parallel Analysis: Multiple auditors running concurrently
  • PoC Validation: Auto-generate and validate Foundry tests

Usage

cd my-solidity-project
opencode

# Start audit
/audit

# Generate PoC
/poc .vigilo/findings/high/H-01-reentrancy.md

Directory Structure

.vigilo/
├── recon/           # Explorator & Speculator outputs
├── findings/        # Vulnerability findings
│   ├── high/
│   └── medium/
├── poc/             # PoC validation logs
└── reports/         # Final reports

Platforms

| Platform | Package | Status | |----------|---------|--------| | OpenCode | packages/opencode | ⭐ Recommended | | Claude Code | packages/claude | Stable |

Why OpenCode? More flexibility with model selection, better plugin extensibility, and cost-effective auditing with configurable models per auditor.


Benchmarking

Measure Vigilo's audit accuracy against verified security reports from Code4rena, Sherlock, and Cantina.

# Run full benchmark pipeline
bunx vigilo-bench sherlock_cork-protocol_2025_01 -w -v

Pipeline: checkout → audit → score → report

See packages/bench for full documentation.


Troubleshooting

bunx vigilo doctor
bunx vigilo doctor --verbose

| Issue | Solution | |-------|----------| | OpenCode not found | Install from https://github.com/anomalyco/opencode | | Foundry not found | curl -L https://foundry.paradigm.xyz \| bash && foundryup | | Vigilo not registered | Run bunx vigilo install again |


Development

For contributors working on Vigilo itself.

Setup

git clone https://github.com/PurpleAILAB/Vigilo.git
cd vigilo/packages/opencode
bun install
bun link

Development Mode

  1. Configure local plugin path in ~/.config/opencode/opencode.json:
{
  "plugin": [
    "D:/path/to/vigilo/packages/opencode"
  ]
}
  1. Run watch mode:
bun run dev
  1. Restart OpenCode to load changes.

Quick Commands

| Task | Command | |------|---------| | Build | bun run build | | Watch mode | bun run dev | | Test CLI | bun src/cli/index.ts install | | Run doctor | bun src/cli/index.ts doctor --verbose |

Restore Production Mode

bunx vigilo install

This resets the plugin path to vigilo@latest.


License

Business Source License 1.1

  • Non-production use: Free
  • Production use: Requires commercial license
  • Change Date: 2029-01-21 (converts to Apache-2.0)

Commercial licensing: catower917@gmail.com


<div align="center">

Ready to hunt bugs? 🔍

Get Started · Report Bug · Request Feature

</div>
View on GitHub
GitHub Stars11
CategoryEducation
Updated8h ago
Forks5

Languages

TypeScript

Security Score

80/100

Audited on Mar 31, 2026

No findings