Installation
CodeVigil is available on the VS Code Marketplace. There are three ways to install it:
From the Marketplace
- Open VS Code
- Click the Extensions icon in the sidebar (or press
Ctrl+Shift+X/Cmd+Shift+X) - Search for CodeVigil
- Click Install
From the Command Line
code --install-extension BitsPlus.codevigilFrom the VS Code Quick Open
Press Ctrl+P / Cmd+P and paste:
ext install BitsPlus.codevigilOnce installed, CodeVigil activates automatically. There is no configuration required to start scanning.
Your First Scan
CodeVigil scans files automatically when you open or edit them. To see it in action:
- Open any project in VS Code
- Open a source file in a supported language (JavaScript, TypeScript, Python, Java, Go, etc.)
- CodeVigil will analyze the file and show any findings as inline diagnostics
Vulnerabilities appear as squiggly underlines in your editor, just like TypeScript errors or ESLint warnings. The color indicates severity:
- Red: Critical or High severity
- Yellow: Medium severity
- Green: Low severity (informational)
Hover for Details
Hover over any highlighted vulnerability to see:
- The vulnerability type (e.g., "SQL Injection")
- The OWASP category (e.g., "A03: Injection")
- A severity rating (Critical, High, Medium, or Low)
- A brief explanation of the risk
- A suggested fix
Quick Fix Actions
For many vulnerability patterns, CodeVigil provides Quick Fix actions. Click the lightbulb icon (or press Ctrl+. / Cmd+.) on a finding to see available fixes.
Using Copilot Chat Integration
If you have GitHub Copilot Chat installed, you can interact with CodeVigil through natural language:
- Open the Copilot Chat panel (
Ctrl+Shift+I/Cmd+Shift+I) - Type
@codevigilfollowed by your question
Example Queries
@codevigil Is this function secure?: Analyzes the function at your cursor position@codevigil Scan this file for vulnerabilities: Runs a full scan on the current file@codevigil What OWASP category is this?: Identifies the OWASP Top 10 category for a highlighted finding@codevigil How do I fix this SQL injection?: Provides a detailed fix with code examples@codevigil Explain CVE-2024-1234: Looks up a specific CVE in the local database
Using with Other AI Assistants (MCP)
CodeVigil includes a built-in MCP (Model Context Protocol) server that works with any MCP-compatible AI assistant, including Cursor, Claude Code, and Windsurf. This means you can scan code, explain findings, and get fix suggestions from whichever AI assistant you prefer.
To get started, point your AI assistant's MCP configuration at CodeVigil's server. See the full MCP Integration guide for setup instructions and example prompts for each assistant.
Understanding the Problems Panel
All CodeVigil findings also appear in VS Code's Problems panel (Ctrl+Shift+M / Cmd+Shift+M). Findings are prefixed with [CodeVigil] and sorted by severity.
You can filter the Problems panel to show only CodeVigil findings by typing "CodeVigil" in the filter box.
Status Bar
The CodeVigil status bar item (bottom of VS Code) shows:
- A shield icon with the current scan status
- The number of open findings in the current file
- Click to open the CodeVigil output panel for detailed scan logs
Next Steps
- Read the Configuration guide to customize CodeVigil's behavior
- Browse the Supported Languages page to see all detection patterns
- Learn about the CVE Database and how local dependency scanning works
- Upgrade to Pro for advanced features like SARIF export and the security dashboard