Skip to content
| Marketplace
Sign in
Visual Studio Code>Programming Languages>Aegis AI Security ScannerNew to Visual Studio Code? Get it now.
Aegis AI Security Scanner

Aegis AI Security Scanner

Preview

wen-zai

|
1 install
| (0) | Free
Find and fix SQL injection, XSS, RCE, and 7+ vulnerability types in real-time. One-click AI patches. 100% F1 on OWASP NodeGoat. JS/TS/Python/PHP/Java/Go.
Installation
Launch VS Code Quick Open (Ctrl+P), paste the following command, and press enter.
Copied to clipboard
More Info

Aegis AI Security Scanner

Find and fix SQL injection, XSS, RCE, and 7+ more vulnerability types as you code.

Real-time SAST scanning for VS Code / Cursor using Tree-sitter AST + taint analysis + AI-driven patches. No CI pipeline. No regex guessing. Framework-aware code generation.

Supports: JavaScript / TypeScript / Python / PHP / Java / Go

v0.3.2 — Now with full English UI, Python validation, and TreeView empty state. See what changed →


Installation

Step 1: Install Extension

VS Code Marketplace: search "Aegis AI Security Scanner" or ID wen-zai.aegis-ai-security

Step 2: Clone Python Engine

The extension needs the Python core to run:

git clone https://github.com/HWZ-499/aegis-ai.git
cd aegis-ai/aegis-ai-core
pip install -r requirements.txt

Done. Extension auto-detects the Python engine. If not, set path in VS Code settings:

{ "aegisAI.serverCwd": "/path/to/aegis-ai-core" }

Step 3: Enable AI Fixes (Optional)

For one-click auto-fix, set an API key:

  • DeepSeek (cheap): export DEEPSEEK_API_KEY=your_key
  • OpenAI: export OPENAI_API_KEY=your_key
  • Ollama (free, local): export AI_PROVIDER=ollama (after ollama pull llama3)

That's it. Open any .js, .ts, .py, .php, .java, or .go file → save → diagnostics appear.


Key Features

  • 1-second feedback — diagnostics appear on save, no CI pipeline
  • Real data-flow analysis — Tree-sitter AST + TaintGraph, not regex
  • One-click AI fix — click lightbulb → framework-aware patch auto-generated
  • 10+ vulnerability types — SQL/NoSQL injection, XSS, RCE, path traversal, deserialization, SSRF, hardcoded credentials, open redirect
  • Real-world validated — 100% F1 on OWASP NodeGoat, 92% F1 on Django 3.2 core

Supported Vulnerability Types

ID Type Languages
SQL_INJECTION SQL Injection JS/TS, Python, Java, Go
NOSQL_INJECTION NoSQL Injection JS/TS, Java, Go
XSS_RISK Cross-Site Scripting JS/TS, Python, PHP, Java, Go
RCE_COMMAND_EXEC Remote Code Execution JS/TS, Python, PHP, Java, Go
PATH_TRAVERSAL Path Traversal JS/TS, Python, PHP, Java, Go
HARDCODED_CREDENTIALS Hardcoded Credentials JS/TS, Python, PHP, Java, Go
DESERIALIZATION Unsafe Deserialization JS/TS, Python, Java, Go
SSRF Server-Side Request Forgery JS/TS, Python
OPEN_REDIRECT Open Redirect JS/TS, Python, Java, Go

Extension Settings

Setting Default Description
aegisAI.enabled true Enable/disable the scanner
aegisAI.pythonPath python Path to the Python interpreter
aegisAI.serverCwd `` Force LSP server working directory (leave blank for auto-detect)
aegisAI.serverModule src.lsp Python module path for the LSP server

Known Issues

  • tree-sitter==0.21.3 may print a FutureWarning on startup (no functional impact)
  • PHP analysis uses Tree-sitter AST for core rules; some niche patterns may still fall back to line-level matching
  • Cross-file taint propagation requires module.exports patterns (CommonJS)

License

MIT © Aegis AI

  • Contact us
  • Jobs
  • Privacy
  • Manage cookies
  • Terms of use
  • Trademarks
© 2026 Microsoft