Skip to main content

Open-source AI Hackers for your apps

Project description

Strix Logo

Strix

Open-source AI Hackers to secure your Apps

Python PyPI PyPI Downloads License

GitHub Stars Discord Website

usestrix%2Fstrix | Trendshift

:star: Love Strix? Give us a star to help other developers discover it!


Strix Demo

[!TIP] New! Strix now integrates seamlessly with GitHub Actions and CI/CD pipelines. Automatically scan for vulnerabilities on every pull request and block insecure code before it reaches production!

[!WARNING] Only test systems you own or have permission to test. You are responsible for using Strix ethically and legally.


🦉 Strix Overview

Strix are autonomous AI agents that act just like real hackers - they run your code dynamically, find vulnerabilities, and validate them through actual proof-of-concepts. Built for developers and security teams who need fast, accurate security testing without the overhead of manual pentesting or the false positives of static analysis tools.

  • Full hacker toolkit out of the box
  • Teams of agents that collaborate and scale
  • Real validation with PoCs, not false positives
  • Developer‑first CLI with actionable reports
  • Auto‑fix & reporting to accelerate remediation

🎯 Use Cases

  • Detect and validate critical vulnerabilities in your applications.
  • Get penetration tests done in hours, not weeks, with compliance reports.
  • Automate bug bounty research and generate PoCs for faster reporting.
  • Run tests in CI/CD to block vulnerabilities before reaching production.

🚀 Quick Start

Prerequisites:

  • Docker (running)
  • Python 3.12+
  • An LLM provider key (or a local LLM)
# Install
pipx install strix-agent

# Configure AI provider
export STRIX_LLM="openai/gpt-5"
export LLM_API_KEY="your-api-key"

# Run security assessment
strix --target ./app-directory

First run pulls the sandbox Docker image. Results are saved under agent_runs/<run-name>.

🏆 Enterprise Platform

Want to skip the setup? Try our cloud-hosted version: usestrix.com

Our managed platform provides:

  • 📈 Executive Dashboards
  • 🧠 Custom Fine-Tuned Models
  • ⚙️ CI/CD Integration
  • 🔍 Large-Scale Scanning
  • 🔌 Third-Party Integrations
  • 🎯 Enterprise Support

Get Enterprise Demo →

✨ Features

🛠️ Agentic Security Tools

  • 🔌 Full HTTP Proxy - Full request/response manipulation and analysis
  • 🌐 Browser Automation - Multi-tab browser for testing of XSS, CSRF, auth flows
  • 💻 Terminal Environments - Interactive shells for command execution and testing
  • 🐍 Python Runtime - Custom exploit development and validation
  • 🔍 Reconnaissance - Automated OSINT and attack surface mapping
  • 📁 Code Analysis - Static and dynamic analysis capabilities
  • 📝 Knowledge Management - Structured findings and attack documentation

🎯 Comprehensive Vulnerability Detection

  • Access Control - IDOR, privilege escalation, auth bypass
  • Injection Attacks - SQL, NoSQL, command injection
  • Server-Side - SSRF, XXE, deserialization flaws
  • Client-Side - XSS, prototype pollution, DOM vulnerabilities
  • Business Logic - Race conditions, workflow manipulation
  • Authentication - JWT vulnerabilities, session management
  • Infrastructure - Misconfigurations, exposed services

🕸️ Graph of Agents

  • Distributed Workflows - Specialized agents for different attacks and assets
  • Scalable Testing - Parallel execution for fast comprehensive coverage
  • Dynamic Coordination - Agents collaborate and share discoveries

💻 Usage Examples

Default Usage

# Local codebase analysis
strix --target ./app-directory

# Repository security review
strix --target https://github.com/org/repo

# Black-Box Web application assessment
strix --target https://your-app.com

# Grey-Box Security Assesment
strix --target https://your-app.com --instructions "Perform authenticated testing using the following credentials user:pass"

# Multi-target white-box testing (source code + deployed app)
strix -t https://github.com/org/app -t https://your-app.com

# Focused testing with instructions
strix --target api.your-app.com --instruction "Focus on business logic flaws and IDOR vulnerabilities"

🤖 Headless Mode

Run Strix programmatically without interactive UI using the -n/--non-interactive flag—perfect for servers and automated jobs. The CLI prints real-time vulnerability findings, and the final report before exiting. Exits with non-zero code when vulnerabilities are found.

strix -n --target https://your-app.com

🔄 CI/CD (GitHub Actions)

Strix can be added to your pipeline to run a security test on pull requests with a lightweight GitHub Actions workflow:

name: strix-penetration-test

on:
  pull_request:

jobs:
  security-scan:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4

      - name: Install Strix
        run: pipx install strix-agent

      - name: Run Strix
        env:
          STRIX_LLM: ${{ secrets.STRIX_LLM }}
          LLM_API_KEY: ${{ secrets.LLM_API_KEY }}

        run: strix -n -t ./

⚙️ Configuration

export STRIX_LLM="openai/gpt-5"
export LLM_API_KEY="your-api-key"

# Optional
export LLM_API_BASE="your-api-base-url"  # if using a local model, e.g. Ollama, LMStudio
export PERPLEXITY_API_KEY="your-api-key"  # for search capabilities

OpenAI's GPT-5 (openai/gpt-5) and Anthropic's Claude Sonnet 4.5 (anthropic/claude-sonnet-4-5) work best with Strix, but we support many other options.

🤝 Contributing

We welcome contributions from the community! There are several ways to contribute:

Code Contributions

See our Contributing Guide for details on:

  • Setting up your development environment
  • Running tests and quality checks
  • Submitting pull requests
  • Code style guidelines

Prompt Modules Collection

Help expand our collection of specialized prompt modules for AI agents:

👥 Join Our Community

Have questions? Found a bug? Want to contribute? Join our Discord!

🌟 Support the Project

Love Strix? Give us a ⭐ on GitHub!

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

strix_agent-0.3.3.tar.gz (189.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

strix_agent-0.3.3-py3-none-any.whl (239.0 kB view details)

Uploaded Python 3

File details

Details for the file strix_agent-0.3.3.tar.gz.

File metadata

  • Download URL: strix_agent-0.3.3.tar.gz
  • Upload date:
  • Size: 189.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/2.0.0 CPython/3.12.8 Linux/6.13.8-arch1-1

File hashes

Hashes for strix_agent-0.3.3.tar.gz
Algorithm Hash digest
SHA256 772c14f343f32de3d0e0997716b117c293b16f6907a7b2b098cb3d9e5329add6
MD5 f4bfac28cc3a3c05efe840279f247b7a
BLAKE2b-256 e0818c030f59a2310bd4d895cd312ce1f1b5c1b66b4ee0b4e0a9eed21990bb78

See more details on using hashes here.

File details

Details for the file strix_agent-0.3.3-py3-none-any.whl.

File metadata

  • Download URL: strix_agent-0.3.3-py3-none-any.whl
  • Upload date:
  • Size: 239.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/2.0.0 CPython/3.12.8 Linux/6.13.8-arch1-1

File hashes

Hashes for strix_agent-0.3.3-py3-none-any.whl
Algorithm Hash digest
SHA256 0ce9729177f224ec2976598b9e88e3676d257af6134289466fa00f1a3ba568ca
MD5 20de9d8543c51454bab8b29af0f41eaa
BLAKE2b-256 2b37c2aec1506da8595b87050c8284c74c36faf13045fcaa8406ab2fd7981d27

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page