--- title: "Introduction" description: "Open-source AI hackers to secure your apps" --- Strix are autonomous AI agents that act like real hackers—they run your code dynamically, find vulnerabilities, and validate them with proof-of-concepts. Install and run your first scan in minutes. Learn all command-line options. Explore the security testing toolkit. Integrate into your CI/CD pipeline. ## Key Capabilities - **Full hacker toolkit** — Browser automation, HTTP proxy, terminal, Python runtime - **Real validation** — PoCs, not false positives - **Multi-agent orchestration** — Specialized agents collaborate on complex targets - **Developer-first CLI** — Interactive TUI or headless mode for automation ## Vulnerability Coverage Strix can identify and validate: | Category | Examples | |----------|----------| | Access Control | IDOR, privilege escalation, auth bypass | | Injection | SQL, NoSQL, command injection | | Server-Side | SSRF, XXE, deserialization | | Client-Side | XSS, prototype pollution, DOM vulnerabilities | | Business Logic | Race conditions, workflow manipulation | | Authentication | JWT vulnerabilities, session management | Only test applications you own or have explicit permission to test.