Overview
CodeVigil Pro extends the free extension with advanced features for professional developers and teams. Pro is available as a monthly subscription ($4.99/mo), annual subscription ($39/yr), or a one-time lifetime license ($99).
All core scanning features (100+ vulnerability patterns across 10 languages, the local CVE database, triple-check scanning, real-time diagnostics, and Copilot Chat integration) remain free. Pro adds features for developers who want deeper insights, team workflows, and CI/CD integration.
Activating Your License
Purchase
Visit the CodeVigil pricing page or the VS Code Marketplace listing to purchase a Pro license. After payment, you will receive a license key via email.
Activation
There are two ways to activate your license:
Via Command Palette:
- Press
Ctrl+Shift+P/Cmd+Shift+P - Type CodeVigil: Activate Pro License
- Paste your license key and press Enter
Via Settings:
{
"codeVigil.pro.licenseKey": "CV-PRO-XXXX-XXXX-XXXX-XXXX"
}Once activated, Pro features are available immediately. The license is validated locally and does not require an internet connection after initial activation.
License Management
- Monthly/Annual: Your license is tied to your email address and can be used on up to 3 machines simultaneously
- Lifetime: Same as above, with no expiration date
- Deactivation: Run
CodeVigil: Deactivate Pro Licensefrom the command palette to remove the license from a machine
Security Dashboard
The security dashboard provides a comprehensive overview of your project's security posture.
Opening the Dashboard
- Click the CodeVigil icon in the VS Code sidebar
- Or run CodeVigil: Show Dashboard from the command palette
Dashboard Panels
Security Score: A 0-100 score based on the number and severity of open findings relative to your codebase size. The score updates in real-time as you fix vulnerabilities.
Findings Over Time: A chart showing how the number of open findings has changed over the past 30 days. Tracks Critical, High, Medium, and Low findings separately.
Top Vulnerability Types: A breakdown of the most common vulnerability types in your project, helping you identify patterns in your code that need attention.
Language Breakdown: Shows which languages in your project have the most findings, helping you prioritize code review efforts.
Recent Activity: A timeline of recently introduced and fixed findings, showing your security improvement trend.
SARIF Export
SARIF (Static Analysis Results Interchange Format) is an OASIS standard for the output of static analysis tools. CodeVigil Pro can export findings in SARIF format for integration with CI/CD pipelines and other security tools.
Automatic Export
Enable automatic SARIF export in your settings:
{
"codeVigil.pro.sarifExport": true,
"codeVigil.pro.sarifPath": ".codevigil/results.sarif"
}When enabled, CodeVigil writes a SARIF file after every workspace scan. The file is updated incrementally as you fix issues.
Manual Export
Run CodeVigil: Export SARIF from the command palette to generate a SARIF file on demand.
CI/CD Integration
The SARIF export integrates with popular CI/CD platforms:
GitHub Actions:
- name: Upload SARIF
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: .codevigil/results.sarifAzure DevOps:
SARIF files can be published as build artifacts and viewed in the Azure DevOps Security tab.
GitLab CI:
security_scan:
artifacts:
reports:
sast: .codevigil/results.sarifPriority Pattern Updates
Pro subscribers receive new vulnerability patterns before they are released to the free tier. When a new high-profile vulnerability is disclosed (like Log4Shell or Spring4Shell), we create detection patterns and push them to Pro users within 48 hours.
Pattern updates are delivered automatically through VS Code's extension update mechanism. No manual action is required.
Team Features
Shared Configuration
Pro enables project-level CodeVigil configuration that can be committed to version control:
// .codevigil/config.json
{
"minimumSeverity": "medium",
"excludePatterns": ["**/test/**", "**/migrations/**"],
"requiredPatterns": ["sql-injection", "xss", "command-injection"],
"blockCommitOnCritical": true
}When this file is present in a repository, all team members using CodeVigil will share the same configuration.
Pre-Commit Hook
CodeVigil Pro can install a Git pre-commit hook that blocks commits containing Critical or High severity findings:
- Run CodeVigil: Install Pre-Commit Hook from the command palette
- The hook will run a quick scan before each commit
- If Critical findings are detected, the commit is blocked with a list of findings
Baseline File
For existing projects with known issues, you can create a baseline that suppresses existing findings:
- Run CodeVigil: Create Baseline from the command palette
- This creates
.codevigil/baseline.jsonwith all current findings - Only new findings (introduced after the baseline) will be shown as diagnostics
This lets teams adopt CodeVigil gradually without being overwhelmed by existing technical debt.
Comparison: Free vs Pro
Free (included with CodeVigil):
- 100+ vulnerability patterns across 10 languages
- Real-time scanning in VS Code
- Local CVE database with 130,000+ entries
- Copilot Chat integration
- Severity-ranked diagnostics
- Quick Fix suggestions
Pro ($4.99/mo, $39/yr, or $99 lifetime):
- Everything in Free
- Security dashboard with trends and scoring
- SARIF export for CI/CD integration
- Priority pattern updates (48-hour SLA)
- Shared team configuration
- Pre-commit hook integration
- Baseline file for gradual adoption
- Priority email support