usestrix/strix
Strix
Open-source AI Hackers to secure your Apps
:star: Love Strix? Give us a star to help other developers discover it!
[!TIP] New! Strix now integrates seamlessly with GitHub Actions and CI/CD pipelines. Automatically scan for vulnerabilities on every pull request and block insecure code before it reaches production!
[!WARNING] Only test systems you own or have permission to test. You are responsible for using Strix ethically and legally.
π¦ Strix Overview
Strix are autonomous AI agents that act just like real hackers - they run your code dynamically, find vulnerabilities, and validate them through actual proof-of-concepts. Built for developers and security teams who need fast, accurate security testing without the overhead of manual pentesting or the false positives of static analysis tools.
- Full hacker toolkit out of the box
- Teams of agents that collaborate and scale
- Real validation with PoCs, not false positives
- Developerβfirst CLI with actionable reports
- Autoβfix & reporting to accelerate remediation
π― Use Cases
- Detect and validate critical vulnerabilities in your applications.
- Get penetration tests done in hours, not weeks, with compliance reports.
- Automate bug bounty research and generate PoCs for faster reporting.
- Run tests in CI/CD to block vulnerabilities before reaching production.
π Quick Start
Prerequisites:
- Docker (running)
- Python 3.12+
- An LLM provider key (or a local LLM)
|
|
First run pulls the sandbox Docker image. Results are saved under agent_runs/<run-name>.
π Enterprise Platform
Want to skip the setup? Try our cloud-hosted version: usestrix.com
Our managed platform provides:
- π Executive Dashboards
- π§ Custom Fine-Tuned Models
- βοΈ CI/CD Integration
- π Large-Scale Scanning
- π Third-Party Integrations
- π― Enterprise Support
β¨ Features
π οΈ Agentic Security Tools
- π Full HTTP Proxy - Full request/response manipulation and analysis
- π Browser Automation - Multi-tab browser for testing of XSS, CSRF, auth flows
- π» Terminal Environments - Interactive shells for command execution and testing
- π Python Runtime - Custom exploit development and validation
- π Reconnaissance - Automated OSINT and attack surface mapping
- π Code Analysis - Static and dynamic analysis capabilities
- π Knowledge Management - Structured findings and attack documentation
π― Comprehensive Vulnerability Detection
- Access Control - IDOR, privilege escalation, auth bypass
- Injection Attacks - SQL, NoSQL, command injection
- Server-Side - SSRF, XXE, deserialization flaws
- Client-Side - XSS, prototype pollution, DOM vulnerabilities
- Business Logic - Race conditions, workflow manipulation
- Authentication - JWT vulnerabilities, session management
- Infrastructure - Misconfigurations, exposed services
πΈοΈ Graph of Agents
- Distributed Workflows - Specialized agents for different attacks and assets
- Scalable Testing - Parallel execution for fast comprehensive coverage
- Dynamic Coordination - Agents collaborate and share discoveries
π» Usage Examples
Default Usage
|
|
π€ Headless Mode
Run Strix programmatically without interactive UI using the -n/--non-interactive flagβperfect for servers and automated jobs. The CLI prints real-time vulnerability findings, and the final report before exiting. Exits with non-zero code when vulnerabilities are found.
|
|
π CI/CD (GitHub Actions)
Strix can be added to your pipeline to run a security test on pull requests with a lightweight GitHub Actions workflow:
|
|
βοΈ Configuration
|
|
π€ Contributing
We welcome contributions from the community! There are several ways to contribute:
Code Contributions
See our Contributing Guide for details on:
- Setting up your development environment
- Running tests and quality checks
- Submitting pull requests
- Code style guidelines
Prompt Modules Collection
Help expand our collection of specialized prompt modules for AI agents:
- Advanced testing techniques for vulnerabilities, frameworks, and technologies
- See Prompt Modules Documentation for guidelines
- Submit via pull requests or issues
π₯ Join Our Community
Have questions? Found a bug? Want to contribute? Join our Discord!
π Support the Project
Love Strix? Give us a β on GitHub!