Quick Start Guide

Get up and running with Agnech security scanning in under 5 minutes.

Choose Your Product

Agnech offers two products for different use cases. Choose the one that fits your workflow.

VS Code Extension

  • Free to use
  • Real-time scanning in your editor
  • 7-engine security analysis
  • 100% local execution
Best for: Individual developers

CLI Tool

Enterprise
  • Enterprise license required
  • CI/CD pipeline integration
  • 6 professional report formats
  • Compliance documentation
Best for: Teams & enterprises

VS Code Extension

Step 1: Install the Extension

Install directly from the VS Code Marketplace or use the command palette.

VS Code Command Palette
Bash
ext install agnech.agnech-security

Or install from the Marketplace

Step 2: Open a Project

Open any project in VS Code. Agnech supports TypeScript, JavaScript, Python, Solidity, Rust, and C/C++.

Step 3: Run Your First Scan

Use the keyboard shortcuts or command palette to run a scan.

Ctrl+Shift+SQuick Scan
Ctrl+Shift+DDeep Scan
Ctrl+Shift+WWorkspace Scan

CLI ToolEnterprise

Enterprise License Required

The CLI tool requires an enterprise license. Contact our sales team at sales@agnech.com to get started.

Step 1: Install the CLI

Terminal
Bash
1# Install globally
2npm install -g @agnech/cli
3
4# Verify installation
5bloodhound --version

Step 2: Activate Your License

Terminal
Bash
1bloodhound license activate YOUR_LICENSE_KEY

Step 3: Scan Your Project

Terminal
Bash
1# Quick scan
2bloodhound scan ./src
3
4# Deep scan with AI verification
5bloodhound scan --deep ./src
6
7# Generate executive report
8bloodhound scan --report executive ./src

Your First Scan

Try scanning this vulnerable code example to see Agnech in action.

example.ts
TypeScript
1// VULNERABLE: SQL Injection
2async function getUser(req, res) {
3 const userId = req.params.id;
4
5 // This query is vulnerable to SQL injection
6 const query = `SELECT * FROM users WHERE id = ${userId}`;
7
8 const result = await db.query(query);
9 return result;
10}
11
12// SECURE: Parameterized Query
13async function getUserSecure(req, res) {
14 const userId = req.params.id;
15
16 // This query uses parameterized values
17 const query = 'SELECT * FROM users WHERE id = $1';
18
19 const result = await db.query(query, [userId]);
20 return result;
21}

Agnech will detect the SQL injection on lines 5-6 and show the secure alternative

Try it yourself

Create a new file with this code and run a quick scan (Ctrl+Shift+S). Agnech will highlight the vulnerability and suggest the fix.

Next Steps