diff --git a/docs/index.mdx b/docs/index.mdx
index 9b407f7..454779a 100644
--- a/docs/index.mdx
+++ b/docs/index.mdx
@@ -3,7 +3,7 @@ title: "Introduction"
description: "Open-source AI hackers to secure your apps"
---
-Strix are autonomous AI agents that act like real hackers—they run your code dynamically, find vulnerabilities, and validate them with proof-of-concepts.
+Strix are autonomous AI agents that act like real hackers—they run your code dynamically, find vulnerabilities, and validate them with proof-of-concepts. Built for developers and security teams who need fast, accurate security testing without the overhead of manual pentesting or the false positives of static analysis tools.
@@ -20,6 +20,13 @@ Strix are autonomous AI agents that act like real hackers—they run your code d
+## Use Cases
+
+- **Application Security Testing** — Detect and validate critical vulnerabilities in your applications
+- **Rapid Penetration Testing** — Get penetration tests done in hours, not weeks
+- **Bug Bounty Automation** — Automate research and generate PoCs for faster reporting
+- **CI/CD Integration** — Block vulnerabilities before they reach production
+
## Key Capabilities
- **Full hacker toolkit** — Browser automation, HTTP proxy, terminal, Python runtime
@@ -27,9 +34,20 @@ Strix are autonomous AI agents that act like real hackers—they run your code d
- **Multi-agent orchestration** — Specialized agents collaborate on complex targets
- **Developer-first CLI** — Interactive TUI or headless mode for automation
-## Vulnerability Coverage
+## Security Tools
-Strix can identify and validate:
+Strix agents come equipped with a comprehensive toolkit:
+
+| Tool | Purpose |
+|------|---------|
+| HTTP Proxy | Full request/response manipulation and analysis |
+| Browser Automation | Multi-tab browser for XSS, CSRF, auth flow testing |
+| Terminal | Interactive shells for command execution |
+| Python Runtime | Custom exploit development and validation |
+| Reconnaissance | Automated OSINT and attack surface mapping |
+| Code Analysis | Static and dynamic analysis capabilities |
+
+## Vulnerability Coverage
| Category | Examples |
|----------|----------|
@@ -39,6 +57,40 @@ Strix can identify and validate:
| Client-Side | XSS, prototype pollution, DOM vulnerabilities |
| Business Logic | Race conditions, workflow manipulation |
| Authentication | JWT vulnerabilities, session management |
+| Infrastructure | Misconfigurations, exposed services |
+
+## Multi-Agent Architecture
+
+Strix uses a graph of specialized agents for comprehensive security testing:
+
+- **Distributed Workflows** — Specialized agents for different attacks and assets
+- **Scalable Testing** — Parallel execution for fast comprehensive coverage
+- **Dynamic Coordination** — Agents collaborate and share discoveries
+
+## Quick Example
+
+```bash
+# Install
+curl -sSL https://strix.ai/install | bash
+
+# Configure
+export STRIX_LLM="openai/gpt-5"
+export LLM_API_KEY="your-api-key"
+
+# Scan
+strix --target ./your-app
+```
+
+## Community
+
+
+
+ Join the community for help and discussion.
+
+
+ Star the repo and contribute.
+
+
Only test applications you own or have explicit permission to test.