Architecture Overview
At its core, Strix orchestrates multiple components working together:AI Agents
LLM-powered security experts that reason about targets and execute tests
Tools
Specialized capabilities for terminal, browser, proxy, file manipulation
Skills
Domain-specific security knowledge injected into agent context
Runtime
Isolated sandboxes providing safe execution environments
Execution Flow
When you start a scan, Strix follows this workflow:1. Scan Initialization
Strix creates a root agent and initializes a sandbox environment:- Target information (URLs, repositories, IP addresses)
- User instructions (custom testing requirements)
- Sandbox workspace (isolated environment with tools)
2. Agent Loop
Each agent operates in a continuous reasoning loop: The agent loop handles:Iteration Management
Iteration Management
Each agent has a maximum iteration limit (default: 300) to prevent infinite loops. As the agent approaches the limit, it receives warnings to prioritize task completion.
State Management
State Management
Agent state tracks the full execution context:
agent_id: Unique identifiermessages: Conversation history with LLMactions_taken: Tool invocations performedcontext: Custom data storageerrors: Any failures encounterediteration: Current loop iteration
Tool Execution
Tool Execution
Tools execute either locally (in the Strix CLI) or remotely (in the sandbox):
3. Multi-Agent Coordination
Strix can spawn specialized sub-agents for complex tasks:Sub-agents share the same workspace and proxy history but maintain independent conversation contexts. This enables parallel testing while building on previous discoveries.
4. Vulnerability Reporting
When agents discover security issues, they create structured reports:- CVSS scoring (automatic calculation from metrics)
- Proof-of-concept code (executable exploit)
- Duplicate detection (prevents redundant findings)
- Code locations (vulnerable files and line numbers)
Sandbox Architecture
Strix sandboxes provide isolated environments where agents can safely execute commands, browse applications, and test for vulnerabilities without affecting your local system.
- Tool server: HTTP API for executing tools (terminal, browser, file operations)
- Caido proxy: Intercepts and logs all HTTP/HTTPS traffic
- Workspace: Shared
/workspacedirectory for code analysis - Isolated network: Contained environment with controlled internet access
Agent Communication
Agents can send messages to each other for coordination:LLM Integration
Strix supports multiple LLM providers with structured output:- Anthropic Claude: Extended thinking, tool use
- OpenAI GPT-4: Function calling, structured responses
- Google Gemini: Multi-modal analysis
- OpenRouter: Access to multiple models
State Persistence
Agent state is tracked throughout execution:- Resume from interruptions: Continue scans after pauses
- Debugging: Review full execution history
- Analytics: Track agent performance and behavior
Next Steps
Agents
Learn about agent types and capabilities
Tools
Explore available tools and their usage
Skills
Understand the skills system
Vulnerability Detection
See how Strix finds security issues