Overview
The Strix sandbox is a Kali Linux-based Docker container that provides:- Isolated Testing Environment - Secure sandbox for running exploits and tests
- Pre-installed Security Tools - Comprehensive toolkit including nmap, nuclei, sqlmap, and more
- HTTP Proxy Integration - Built-in Caido proxy for request/response manipulation
- Browser Automation - Chromium browser for testing XSS, CSRF, and auth flows
- Python Runtime - Custom exploit development and validation
- Multi-architecture Support - Works on x86_64 and ARM64 (Apple Silicon)
Prerequisites
Install Docker
Automatic Image Management
Strix automatically manages the Docker sandbox image:The sandbox image is pulled automatically on first run. This may take a few minutes depending on your internet connection.
Sandbox Container Details
Base Image
The Strix sandbox is built onkalilinux/kali-rolling:latest and includes:
- Operating System: Kali Linux Rolling
- User:
pentester(non-root user with sudo access) - Working Directory:
/workspace - Architecture Support: AMD64 (x86_64) and ARM64 (aarch64)
Installed Tools
The sandbox comes pre-configured with a comprehensive toolkit:Directory Structure
The container is organized with the following directories:HTTP Proxy (Caido)
The sandbox includes a pre-configured Caido HTTP proxy:Proxy Configuration
The proxy is automatically started and configured:- Port: 48080
- Access: Guest mode enabled
- CA Certificate: Auto-generated and trusted
- Project: Temporary project created on startup
SSL/TLS Certificate
The container generates a root CA certificate for HTTPS interception:- Added to the system trust store
- Imported into Caido
- Configured for browser automation
Proxy Environment Variables
All tools are pre-configured to use the proxy:Entrypoint Script
The container uses a custom entrypoint script that:Environment Variables
The sandbox recognizes these environment variables:Runtime Configuration
Python Environment
The container includes a Poetry-managed Python environment:Path Configuration
The PATH includes all tool binaries:Advanced Usage
Running Tools Directly
You can use Strix agents to run any pre-installed tool:Custom Tool Installation
While the sandbox comes fully equipped, you can install additional tools through instructions:Resource Limits
Docker resource limits are managed by Strix automatically, but you can configure Docker:Security Considerations
Isolation
- Network Isolation - Container network is isolated from host
- Filesystem Isolation - Only
/workspaceis mounted from host - User Isolation - Runs as non-root
pentesteruser - Temporary Projects - Caido projects are temporary and not persisted
Best Practices
- Volume Mounts - Strix only mounts necessary directories
- Network Access - Container has internet access for testing
- Privileged Capabilities - Only required capabilities are granted (e.g.,
cap_net_rawfor nmap) - Cleanup - Containers are automatically cleaned up after scans
Troubleshooting
Docker Not Running
If Docker is not available:Image Pull Failures
If the image fails to download:Permission Errors
On Linux, add your user to the docker group:Resource Constraints
If you encounter memory or CPU issues:Container Cleanup
Strix automatically cleans up containers, but you can manually clean:Next Steps
- Learn about CI/CD integration for automated testing
- Review GitHub Actions workflows
- Explore CLI options for advanced configuration