Troubleshooting
Common issues, diagnostics, and fixes for the Vulnetix AI Coding Agent Plugin.
Hook Not Triggering
Symptoms: No vulnerability scan output appears after git commit or npm install. No .vulnetix/ directory is created.
Diagnostics:
Verify the plugin is installed:
/pluginsYou should see
vulnetixin the list.Check that hooks are registered:
/hooksYou should see hooks like
vulnetix/hooks/pre-commit-scanlisted.Verify the Vulnetix CLI is healthy and authenticated:
vulnetix vdb status
Fixes:
- If the plugin is not listed, reinstall it following the installation guide.
- If the CLI is not found, see CLI Not Found below.
- If the API returns an authentication error, run
vulnetix auth login.
API Unavailable or Not Authenticated
Symptoms: Hooks exit silently. Commands return authentication errors.
Fix:
vulnetix auth login
Then verify:
vulnetix vdb status -o json
The status response should show the API is healthy and your authentication token is valid.
Skill Commands Not Working
Symptoms: Typing /vulnetix fix CVE-2021-44228 does nothing or returns an error.
Fix: Use the colon syntax for all plugin skills and commands:
/vulnetix:fix CVE-2021-44228
Not:
/vulnetix fix CVE-2021-44228
The colon separates the plugin name from the skill/command name. A space between them is not recognized.
Hook Timeout
Symptoms: Hook output is delayed or truncated. Claude Code reports a hook timeout.
Possible causes:
- Slow network connection to the Vulnetix API (affects API health check before background search launches)
- Too many manifest files staged in a single commit (package extraction is local but scales with file size)
- Large dependency trees producing slow SBOM generation (post-install hook only)
Fixes:
- Check your network connectivity:
vulnetix vdb status -o json - The pre-commit hook runs package searches in the background and should not cause significant delay. If you see lag, it is likely from the CLI discovery or API health check before the background process launches.
- The post-install hook has a 120-second timeout. If you consistently hit this limit, consider installing fewer packages at once.
Memory File Issues
Symptoms: Skills or hooks report errors reading .vulnetix/memory.yaml. Vulnerability state is not persisted between sessions.
Diagnostics:
Check the file exists:
ls -la .vulnetix/memory.yamlVerify file permissions (must be readable and writable):
stat .vulnetix/memory.yamlValidate the schema version:
head -5 .vulnetix/memory.yamlThe file should start with
schema_version: 1.
Fixes:
- If the file does not exist, run any hook or skill to create it (e.g., stage a manifest file and run
git commit). - If the file has a legacy location (
.vulnetix-memory.yamlat the repo root), the pre-commit hook will migrate it automatically on the next run. - If the file is corrupted, back it up and delete it. The next hook run will create a fresh one (previous vulnerability decisions will be lost).
CLI Not Found
Symptoms: Hooks exit silently. Running vulnetix in the terminal returns “command not found”.
Diagnostics:
The plugin hooks probe multiple locations for the vulnetix binary:
- Standard PATH (
command -v vulnetix) - Homebrew on Linux (
/home/linuxbrew/.linuxbrew/bin/vulnetix) - Homebrew on macOS (
/opt/homebrew/bin/vulnetix) - System-wide (
/usr/local/bin/vulnetix) - Local bin (
~/.local/bin/vulnetix) - Go bin (
~/go/bin/vulnetix) - Cargo bin (
~/.cargo/bin/vulnetix) - Shell rc sourcing (sources
~/.bashrcor~/.zshrcin a subshell)
Fixes:
If the CLI is installed but not on your PATH, source your shell config:
! source ~/.bashrcor
! source ~/.zshrcIf the CLI is not installed, follow the prerequisites guide.
If the CLI is installed in a non-standard location, add it to your PATH:
export PATH="$PATH:/path/to/vulnetix/bin"Add this to your shell rc file for persistence.