File location
Place agent files in your.cyberstrike/agents/ directory:
~/.cyberstrike/agents/.
CyberStrike scans both agent/ and agents/ subdirectories automatically — no registration required.
Agent file format
An agent file is a Markdown file with YAML frontmatter. The frontmatter defines the agent’s configuration, and the Markdown body becomes its system prompt.Frontmatter fields
model
model
The model ID in
provider/model format, e.g. anthropic/claude-sonnet-4-5 or openai/gpt-4o. If omitted, the agent inherits the global model setting.description
description
A short description of when to use this agent. Shown in the agent picker and used by parent agents to decide which subagent to invoke.
mode
mode
Controls where the agent is available:
Defaults to
| Value | Behavior |
|---|---|
primary | Selectable from the TUI and via --agent flag |
subagent | Only invokable by other agents via the Task tool |
all | Available as both a primary and subagent |
primary if not set.temperature
temperature
Sampling temperature as a number (e.g.
0.7). Lower values produce more deterministic output. Overrides the model’s default.top_p
top_p
Top-p (nucleus) sampling value as a number between 0 and 1.
color
color
Display color for the agent in the TUI. Accepts a hex color (e.g.
"#FF5733") or a theme color name: primary, secondary, accent, success, warning, error, info.steps
steps
Maximum number of agentic loop iterations before the agent is forced to produce a text-only response. Useful for constraining runaway agents.
hidden
hidden
disable
disable
Set to
true to disable the agent entirely, including built-in agents.Agent modes
Primary agents
Primary agents are invoked directly by the user. They appear in the agent picker (press the agent cycle key or use--agent on the CLI).
Subagents
Subagents are spawned by other agents via the Task tool. They do not appear in the main agent picker unlessmode: all is set. Use subagents to decompose complex tasks into parallel or specialized workstreams.
All
Settingmode: all makes an agent selectable directly by users and callable by other agents:
Example: API security specialist
Overriding built-in agents
You can tune built-in agents (likecyberstrike, web-application, internal-network) via cyberstrike.json without replacing them entirely:
Generating an agent
Use the CLI to scaffold a new agent from a description using your configured LLM:Built-in agents
CyberStrike ships with the following agents:cyberstrike
The default primary agent. Full tool access, AI-powered offensive security.
web-application
OWASP Top 10, WSTG methodology, API security. Loads WSTG skills automatically.
internal-network
Active Directory, Kerberos, lateral movement. Loads AD and Kerberos skills.
cloud-security
AWS, Azure, GCP security testing. IAM analysis and CIS benchmarks.
mobile-application
Android/iOS testing, OWASP MASTG/MASVS, Frida/Objection.
general
General-purpose subagent for research and multi-step tasks.