Back to Blog
Development2026-03-077 min read

Scaling Solo: Building VigilFlux with Claude Code Plus and the Agentic Pipeline

The "10x Developer" is mostly a myth. They're just someone who writes spaghetti code and burns out in three years.

But something real is happening right now: one person can now ship what used to require a team of four. Not because humans got smarter. Because our tools finally turned into collaborators instead of chatbots.

I built VigilFlux solo over the past few months. It's a full vulnerability scanning pipeline that would normally need a backend engineer, a security researcher, a DevOps person, and a QA lead. I did it alone.

Not by typing faster. By treating Claude Code Plus as the engine for a multi-agent architecture.

The First Rule: Generated Code is a Draft, Not a Feature

This is the mindset that changed everything.

When you're building security tools, you can't afford bugs. Every line of AI-generated code goes through the same review gates as human code. Actually, stricter.

I treat Claude like a junior developer with unlimited stamina but zero judgment. Every output is untrusted input until it passes TDD, linting, type checking, and a dedicated security review. That's not pessimism. That's how you scale without technical debt.

Multi-Agent Architecture: Divide and Conquer

Instead of one giant context window, I split the work into specialized agents.

The Architect keeps the big picture: "No blocking I/O. Python 3.11 only. Type hints everywhere."

The Scout handles external integrations: port scans, subdomain enumeration, tech fingerprinting.

The Hunter runs the actual vulnerability checks: SQL injection, XSS, template-based scanning.

The Auditor doesn't write features. It only writes tests and reviews code. Its job is to say "no."

Each agent has a single responsibility. No context fog. No hallucinations from conflicting instructions.

The Real Leverage: MCP + Direct Tool Access

Model Context Protocol is the game changer that actually makes this work.

Standard LLMs suggest a curl command. You run it. They never see the output.

With MCP, Claude can read your codebase, query your actual database schema, run tests, commit to git, even spin up Docker containers. It sees the feedback loop.

When I ask it to "implement a new scanner," it doesn't hallucinate. It checks the existing interface, writes the code, runs the tests, reads the actual error messages, and fixes them. All in one go.

TDD: The Truth Anchor

I never ask for "a feature." I ask for "the test for a feature."

Test fails. Red. Then the agent builds the implementation. It runs the test. It fails again. It reads the actual traceback, not a guess about what might be wrong. It fixes it. Test passes. Green.

This kills hallucination dead. The test is what actually happens in reality. The code either matches or it doesn't.

I've watched the security auditor agent catch race conditions in asyncio code that would've shipped otherwise. That's when I realized this actually works.

The Workflow That Ships

Here's what a real feature looks like from start to merge:

  1. Spec: Describe what you want. The architect outlines the files and dependencies.
  2. Test: The auditor writes the test. It fails.
  3. Build: The hunter writes the code. Runs the test. It fails.
  4. Loop: Read the error. Fix the code. Run the test again. Repeat until it passes.
  5. Security: Pipe the diff to the security auditor. It flags unsanitized inputs, hardcoded secrets, inefficient loops.
  6. Commit: Code that survived the gauntlet goes to main.

No magic. No shortcuts. Just a systematic pipeline.

What This Actually Means

I spent 80% of my time architecting and orchestrating. 20% writing code.

We're not moving toward an era of "AI developers." We're moving toward an era of "system architects" who can manage a digital workforce.

The code is the draft. The tests are truth. The agents are the execution.

One person. Full-stack security platform. Shipped.