docs/index.mdx
Strix are autonomous AI agents that act like real hackers—they run your code dynamically, find vulnerabilities, and validate them with proof-of-concepts. Built for developers and security teams who need fast, accurate security testing without the overhead of manual pentesting or the false positives of static analysis tools.
<Frame> </Frame> <CardGroup cols={2}> <Card title="Quick Start" icon="rocket" href="/quickstart"> Install and run your first scan in minutes. </Card> <Card title="CLI Reference" icon="terminal" href="/usage/cli"> Learn all command-line options. </Card> <Card title="Tools" icon="wrench" href="/tools/overview"> Explore the security testing toolkit. </Card> <Card title="GitHub Actions" icon="github" href="/integrations/github-actions"> Integrate into your CI/CD pipeline. </Card> </CardGroup>Strix agents come equipped with a comprehensive toolkit:
| Tool | Purpose |
|---|---|
| HTTP Proxy | Full request/response manipulation and analysis |
| Browser Automation | Multi-tab browser for XSS, CSRF, auth flow testing |
| Terminal | Interactive shells for command execution |
| Python Runtime | Custom exploit development and validation |
| Reconnaissance | Automated OSINT and attack surface mapping |
| Code Analysis | Static and dynamic analysis capabilities |
| Category | Examples |
|---|---|
| Access Control | IDOR, privilege escalation, auth bypass |
| Injection | SQL, NoSQL, command injection |
| Server-Side | SSRF, XXE, deserialization |
| Client-Side | XSS, prototype pollution, DOM vulnerabilities |
| Business Logic | Race conditions, workflow manipulation |
| Authentication | JWT vulnerabilities, session management |
| Infrastructure | Misconfigurations, exposed services |
Strix uses a graph of specialized agents for comprehensive security testing:
# Install
curl -sSL https://strix.ai/install | bash
# Configure
export STRIX_LLM="openai/gpt-5.4"
export LLM_API_KEY="your-api-key"
# Scan
strix --target ./your-app