usestrix / strix
- ΡΡΠ±Π±ΠΎΡΠ°, 8 Π½ΠΎΡΠ±ΡΡ 2025β―Π³. Π² 00:00:02
β¨ Open-source AI hackers for your apps π¨π»βπ»
β Love Strix? Give us a star to help other developers discover it!
Tip
New! Strix now integrates seamlessly with GitHub Actions and CI/CD pipelines. Automatically scan for vulnerabilities on every pull request and block insecure code before it reaches production!
Strix are autonomous AI agents that act just like real hackers - they run your code dynamically, find vulnerabilities, and validate them through actual proof-of-concepts. Built for developers and security teams who need fast, accurate security testing without the overhead of manual pentesting or the false positives of static analysis tools.
Prerequisites:
# Install
pipx install strix-agent
# Configure AI provider
export STRIX_LLM="openai/gpt-5"
export LLM_API_KEY="your-api-key"
# Run security assessment
strix --target ./app-directoryFirst run pulls the sandbox Docker image. Results are saved under agent_runs/<run-name>.
Want to skip the setup? Try our cloud-hosted version: usestrix.com
# Local codebase analysis
strix --target ./app-directory
# Repository security review
strix --target https://github.com/org/repo
# Web application assessment
strix --target https://your-app.com
# Multi-target white-box testing (source code + deployed app)
strix -t https://github.com/org/app -t https://your-app.com
# Test multiple environments simultaneously
strix -t https://dev.your-app.com -t https://staging.your-app.com -t https://prod.your-app.com
# Focused testing with instructions
strix --target api.your-app.com --instruction "Prioritize authentication and authorization testing"
# Testing with credentials
strix --target https://your-app.com --instruction "Test with credentials: testuser/testpass. Focus on privilege escalation and access control bypasses."export STRIX_LLM="openai/gpt-5"
export LLM_API_KEY="your-api-key"
# Optional
export LLM_API_BASE="your-api-base-url" # if using a local model, e.g. Ollama, LMStudio
export PERPLEXITY_API_KEY="your-api-key" # for search capabilitiesRun Strix programmatically without interactive UI using the -n/--non-interactive flagβperfect for servers and automated jobs. The CLI prints real-time vulnerability findings, and the final report before exiting. Exits with non-zero code when vulnerabilities are found.
strix -n --target https://your-app.com --instruction "Focus on authentication and authorization vulnerabilities"Strix can be added to your pipeline to run a security test on pull requests with a lightweight GitHub Actions workflow:
name: strix-penetration-test
on:
pull_request:
jobs:
security-scan:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- name: Install Strix
run: pipx install strix-agent
- name: Run Strix
env:
STRIX_LLM: ${{ secrets.STRIX_LLM }}
LLM_API_KEY: ${{ secrets.LLM_API_KEY }}
run: strix -n -t ./Our managed platform provides:
Warning
Only test systems you own or have permission to test. You are responsible for using Strix ethically and legally.
We welcome contributions from the community! There are several ways to contribute:
See our Contributing Guide for details on:
Help expand our collection of specialized prompt modules for AI agents:
Love Strix? Give us a β on GitHub!
Have questions? Found a bug? Want to contribute? Join our Discord!