Switching agents
- TUI (interactive)
- CLI flag
Press
Tab in the terminal UI to cycle through available agents. The current agent name is shown in the status bar.Primary agent
cyberstrike
The default agent. Full tool access — bash, browser, file operations, web search, and vulnerability reporting. Orchestrates specialized sub-agents for domain work. Follows a structured Thought → Action → Observation cycle for every step. Use this when you want CyberStrike to direct the engagement end-to-end.
Specialist agents
These agents are sub-agents that the primarycyberstrike agent can delegate to, and can also be activated directly from the TUI or CLI.
web-application
OWASP Top 10, WSTG methodology, API security testing. Covers 120+ individual test cases across 12 WSTG categories.
mobile-application
Android and iOS security testing. OWASP MASTG/MASVS compliance. Static analysis, dynamic instrumentation with Frida and Objection, certificate pinning bypass.
cloud-security
AWS, Azure, and GCP security assessment. IAM misconfiguration review, CIS benchmark checks, exposed resource discovery, and Kubernetes security.
internal-network
Active Directory attacks, Kerberos exploitation, lateral movement, and pivoting. Uses BloodHound, Impacket, NetExec, and Responder.
Proxy tester agents
Eight specialized agents that intercept HTTP traffic from your browser and run targeted vulnerability tests on each intercepted request. Theproxy-agent orchestrates them automatically.
proxy-agent + 8 testers
Intercept → analyze → select testers → execute → report. Covers IDOR, authorization bypass, mass assignment, injection, authentication, business logic, SSRF, and file attacks.
| Agent | Vulnerability class |
|---|---|
proxy-agent | Orchestrator — routes each request to appropriate testers |
proxy-tester-idor | Insecure Direct Object References |
proxy-tester-authz | Authorization bypass and broken access control |
proxy-tester-mass-assignment | Parameter injection and privilege escalation via extra fields |
proxy-tester-injection | SQL, NoSQL, XSS, SSTI, XXE, command, and LDAP injection |
proxy-tester-authn | Authentication bypass, JWT flaws, session attacks |
proxy-tester-business-logic | Price manipulation, workflow bypass, rate limit abuse |
proxy-tester-ssrf | Server-Side Request Forgery including cloud metadata |
proxy-tester-file-attacks | File upload validation, path traversal, file inclusion |
Internal agents
These agents run as infrastructure for the platform and are not visible in the agent switcher.| Agent | Purpose |
|---|---|
explore | Fast codebase search and analysis sub-agent |
general | General-purpose parallel task execution |
proxy-analyzer | Extracts architecture context from intercepted requests |
compaction | Context window management |
summary | Session summarization |
title | Session title generation |
normalize-request | Request normalization |
Creating custom agents
You can define your own agents in~/.config/cyberstrike/config.json. Custom agents can have their own system prompt, model, temperature, tool permissions, and skills.
See Custom agents for the full configuration reference, including how to restrict tool permissions, load skills, and set a custom model per agent.