Skip to main content

Open-source AI Hackers for your apps

Project description

Strix Logo

Strix

Open-source AI Hackers to secure your Apps

Python PyPI PyPI Downloads License

GitHub Stars Discord Website

:star: Love Strix? Give us a star to help other developers discover it!


Strix Demo

[!TIP] New! Strix now integrates seamlessly with GitHub Actions and CI/CD pipelines. Automatically scan for vulnerabilities on every pull request and block insecure code before it reaches production!


🦉 Strix Overview

Strix are autonomous AI agents that act just like real hackers - they run your code dynamically, find vulnerabilities, and validate them through actual proof-of-concepts. Built for developers and security teams who need fast, accurate security testing without the overhead of manual pentesting or the false positives of static analysis tools.

  • Full hacker toolkit out of the box
  • Teams of agents that collaborate and scale
  • Real validation with PoCs, not false positives
  • Developer‑first CLI with actionable reports
  • Auto‑fix & reporting to accelerate remediation

🎯 Use Cases

  • Detect and validate critical vulnerabilities in your applications.
  • Get penetration tests done in hours, not weeks, with compliance reports.
  • Automate bug bounty research and generate PoCs for faster reporting.
  • Run tests in CI/CD to block vulnerabilities before reaching production.

🚀 Quick Start

Prerequisites:

  • Docker (running)
  • Python 3.12+
  • An LLM provider key (or a local LLM)
# Install
pipx install strix-agent

# Configure AI provider
export STRIX_LLM="openai/gpt-5"
export LLM_API_KEY="your-api-key"

# Run security assessment
strix --target ./app-directory

First run pulls the sandbox Docker image. Results are saved under agent_runs/<run-name>.

☁️ Cloud Hosted

Want to skip the setup? Try our cloud-hosted version: usestrix.com

✨ Features

🛠️ Agentic Security Tools

  • 🔌 Full HTTP Proxy - Full request/response manipulation and analysis
  • 🌐 Browser Automation - Multi-tab browser for testing of XSS, CSRF, auth flows
  • 💻 Terminal Environments - Interactive shells for command execution and testing
  • 🐍 Python Runtime - Custom exploit development and validation
  • 🔍 Reconnaissance - Automated OSINT and attack surface mapping
  • 📁 Code Analysis - Static and dynamic analysis capabilities
  • 📝 Knowledge Management - Structured findings and attack documentation

🎯 Comprehensive Vulnerability Detection

  • Access Control - IDOR, privilege escalation, auth bypass
  • Injection Attacks - SQL, NoSQL, command injection
  • Server-Side - SSRF, XXE, deserialization flaws
  • Client-Side - XSS, prototype pollution, DOM vulnerabilities
  • Business Logic - Race conditions, workflow manipulation
  • Authentication - JWT vulnerabilities, session management
  • Infrastructure - Misconfigurations, exposed services

🕸️ Graph of Agents

  • Distributed Workflows - Specialized agents for different attacks and assets
  • Scalable Testing - Parallel execution for fast comprehensive coverage
  • Dynamic Coordination - Agents collaborate and share discoveries

💻 Usage Examples

# Local codebase analysis
strix --target ./app-directory

# Repository security review
strix --target https://github.com/org/repo

# Web application assessment
strix --target https://your-app.com

# Multi-target white-box testing (source code + deployed app)
strix -t https://github.com/org/app -t https://your-app.com

# Test multiple environments simultaneously
strix -t https://dev.your-app.com -t https://staging.your-app.com -t https://prod.your-app.com

# Focused testing with instructions
strix --target api.your-app.com --instruction "Prioritize authentication and authorization testing"

# Testing with credentials
strix --target https://your-app.com --instruction "Test with credentials: testuser/testpass. Focus on privilege escalation and access control bypasses."

⚙️ Configuration

export STRIX_LLM="openai/gpt-5"
export LLM_API_KEY="your-api-key"

# Optional
export LLM_API_BASE="your-api-base-url"  # if using a local model, e.g. Ollama, LMStudio
export PERPLEXITY_API_KEY="your-api-key"  # for search capabilities

📚 View supported AI models

🤖 Headless Mode

Run Strix programmatically without interactive UI using the -n/--non-interactive flag—perfect for servers and automated jobs. The CLI prints real-time vulnerability findings, and the final report before exiting. Exits with non-zero code when vulnerabilities are found.

strix -n --target https://your-app.com --instruction "Focus on authentication and authorization vulnerabilities"

🔄 CI/CD (GitHub Actions)

Strix can be added to your pipeline to run a security test on pull requests with a lightweight GitHub Actions workflow:

name: strix-penetration-test

on:
  pull_request:

jobs:
  security-scan:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4

      - name: Install Strix
        run: pipx install strix-agent

      - name: Run Strix
        env:
          STRIX_LLM: ${{ secrets.STRIX_LLM }}
          LLM_API_KEY: ${{ secrets.LLM_API_KEY }}

        run: strix -n -t ./

🏆 Enterprise Platform

Our managed platform provides:

  • 📈 Executive Dashboards
  • 🧠 Custom Fine-Tuned Models
  • ⚙️ CI/CD Integration
  • 🔍 Large-Scale Scanning
  • 🔌 Third-Party Integrations
  • 🎯 Enterprise Support

Get Enterprise Demo →

🔒 Security Architecture

  • Container Isolation - All testing in sandboxed Docker environments
  • Local Processing - Testing runs locally, no data sent to external services

[!WARNING] Only test systems you own or have permission to test. You are responsible for using Strix ethically and legally.

🤝 Contributing

We welcome contributions from the community! There are several ways to contribute:

Code Contributions

See our Contributing Guide for details on:

  • Setting up your development environment
  • Running tests and quality checks
  • Submitting pull requests
  • Code style guidelines

Prompt Modules Collection

Help expand our collection of specialized prompt modules for AI agents:

🌟 Support the Project

Love Strix? Give us a ⭐ on GitHub!

👥 Join Our Community

Have questions? Found a bug? Want to contribute? Join our Discord!

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

strix_agent-0.3.2.tar.gz (189.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

strix_agent-0.3.2-py3-none-any.whl (238.9 kB view details)

Uploaded Python 3

File details

Details for the file strix_agent-0.3.2.tar.gz.

File metadata

  • Download URL: strix_agent-0.3.2.tar.gz
  • Upload date:
  • Size: 189.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/2.0.0 CPython/3.12.8 Linux/6.13.8-arch1-1

File hashes

Hashes for strix_agent-0.3.2.tar.gz
Algorithm Hash digest
SHA256 4449325797a434d648678379d5e4066ece26e747c05171e8bd071a4db78ce9bb
MD5 3778b3fea06d071932c669890f4f7349
BLAKE2b-256 b9f2c8133de169c7b65fb7059edbf60809b7a3a3f4d43316a20076d0531e3bb1

See more details on using hashes here.

File details

Details for the file strix_agent-0.3.2-py3-none-any.whl.

File metadata

  • Download URL: strix_agent-0.3.2-py3-none-any.whl
  • Upload date:
  • Size: 238.9 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/2.0.0 CPython/3.12.8 Linux/6.13.8-arch1-1

File hashes

Hashes for strix_agent-0.3.2-py3-none-any.whl
Algorithm Hash digest
SHA256 703e6288c7ab8292aa44a606c31448f8d9dd8fe62f45a4d5de61a7434823954e
MD5 6a044db719f6088e9d3bebc2a0440ed3
BLAKE2b-256 76153791489f0cd447bee6d1f4ac8ab66ca14c1aa9efc3a5a086bb6ca33102c3

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page