Detection Methodology
Strix follows a structured approach to vulnerability discovery:1. Target Analysis
Agents begin by understanding the target:- Technology stack identification: Fingerprint frameworks, languages, libraries
- Attack surface mapping: Enumerate endpoints, parameters, features
- Authentication mechanisms: Analyze login flows, token management
- Architecture patterns: Detect SPAs, APIs, microservices, serverless
2. Reconnaissance
Skills guide targeted information gathering:- JWT Authentication
- SQL Injection
- IDOR
From
authentication_jwt skill:3. Hypothesis Formation
Agents form testable hypotheses:4. Test Execution
Agents execute tests using appropriate tools:JWT Algorithm Confusion Test
JWT Algorithm Confusion Test
SQL Injection Test
SQL Injection Test
IDOR Test
IDOR Test
5. Result Validation
Agents validate findings to avoid false positives:Confirm Exploitation
Ensure the vulnerability is actually exploitable:
- JWT confusion: Backend accepts malicious token and returns authenticated data
- SQL injection: Query execution confirmed via error messages or data extraction
- IDOR: Cross-account access confirmed with different user contexts
Vulnerability Reporting
Once validated, agents create structured reports:- Pin expected algorithm per key: Store algorithm with each key in your config
- Reject symmetric algorithms for public key crypto: Never use HS256 with RSA keys
-
Implement defense in depth:
- Validate issuer (iss) claim
- Enforce audience (aud) claim
- Check token expiration strictly
- Use short-lived tokens with refresh rotation
-
Security testing:
- Add tests for algorithm confusion
- Verify none algorithm is rejected
- Test with various alg header values
-
Consider additional protections:
- Implement token binding (DPoP)
- Use mTLS for sensitive operations
- Monitor for suspicious token usage patterns """,
- JWT Algorithm Confusion: 9.1 Critical (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)
- SQL Injection: 8.6 High (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)
- IDOR: 6.5 Medium (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
Duplicate Detection
Strix prevents redundant findings:- Title similarity
- Endpoint matching
- Technical analysis overlap
- Vulnerability type
Testing Patterns
Authentication Testing
Authorization Testing
Injection Testing
Best Practices
Validation Before Reporting
✅ Confirm exploitability - Test with different contexts, users, permissions ✅ Document exact steps - Reports must be reproducible ✅ Assess real impact - Consider business context, not just technical severity ✅ Provide working PoC - Executable code, not just descriptions ✅ Check for duplicates - Avoid reporting the same issue multiple timesFalse Positive Reduction
❌ Error messages alone aren’t vulnerabilities without exploitation ❌ Security headers missing isn’t critical without active exploitation path ❌ Verbose responses require demonstrated impact ❌ Information disclosure must leak sensitive data, not just version numbersReport Quality
High-quality reports include:- Clear title: “JWT Algorithm Confusion” not “Auth problem”
- Concise description: 2-3 sentences explaining the core issue
- Demonstrated impact: “Allows any user to access admin panel” not “Could be risky”
- Working exploit: Code that actually runs and demonstrates the vulnerability
- Specific remediation: “Use algorithms: [‘RS256’]” not “Fix the JWT validation”
Next Steps
Skills
Explore available security testing skills
Tools
Learn about testing tools
Agents
Understand agent coordination
Examples
See real vulnerability findings