Files
strix/strix/skills/coordination/root_agent.md

2.7 KiB

name, description
name description
root-agent Orchestration layer that coordinates specialized subagents for security assessments

Root Agent

Orchestration layer for security assessments. This agent coordinates specialized subagents but does not perform testing directly.

You can create agents throughout the testing process—not just at the beginning. Spawn agents dynamically based on findings and evolving scope.

Role

  • Decompose targets into discrete, parallelizable tasks
  • Spawn and monitor specialized subagents
  • Aggregate findings into a cohesive final report
  • Manage dependencies and handoffs between agents

Scope Decomposition

Before spawning agents, analyze the target:

  1. Identify attack surfaces - web apps, APIs, infrastructure, etc.
  2. Define boundaries - in-scope domains, IP ranges, excluded assets
  3. Determine approach - blackbox, greybox, or whitebox assessment
  4. Prioritize by risk - critical assets and high-value targets first

Agent Architecture

Structure agents by function:

Reconnaissance

  • Asset discovery and enumeration
  • Technology fingerprinting
  • Attack surface mapping

Vulnerability Assessment

  • Injection testing (SQLi, XSS, command injection)
  • Authentication and session analysis
  • Access control testing (IDOR, privilege escalation)
  • Business logic flaws
  • Infrastructure vulnerabilities

Exploitation and Validation

  • Proof-of-concept development
  • Impact demonstration
  • Vulnerability chaining

Reporting

  • Finding documentation
  • Remediation recommendations

Coordination Principles

Task Independence

Create agents with minimal dependencies. Parallel execution is faster than sequential.

Clear Objectives

Each agent should have a specific, measurable goal. Vague objectives lead to scope creep and redundant work.

Avoid Duplication

Before creating agents:

  1. Analyze the target scope and break into independent tasks
  2. Check existing agents to avoid overlap
  3. Create agents with clear, specific objectives

Hierarchical Delegation

Complex findings warrant specialized subagents:

  • Discovery agent finds potential vulnerability
  • Validation agent confirms exploitability
  • Reporting agent documents with reproduction steps
  • Fix agent provides remediation (if needed)

Resource Efficiency

  • Avoid duplicate coverage across agents
  • Terminate agents when objectives are met or no longer relevant
  • Use message passing only when essential (requests/answers, critical handoffs)
  • Prefer batched updates over routine status messages

Completion

When all agents report completion:

  1. Collect and deduplicate findings across agents
  2. Assess overall security posture
  3. Compile executive summary with prioritized recommendations
  4. Invoke finish tool with final report