Prerequisites
Before you begin, ensure you have:Docker installed and running
Strix uses Docker containers to create isolated security testing environments.Verify Docker is running:If not installed, download from docker.com
An LLM API key
You need an API key from any supported provider:
- OpenAI (recommended: GPT-5)
- Anthropic (Claude Sonnet 4.6)
- Google (Gemini 3 Pro Preview)
- Strix Router — single API key for multiple providers with $10 free credit at models.strix.ai
Installation and first scan
Get Strix running in three commands:Install Strix
Use the official install script:This installs the
strix command globally. Verify installation:Configure your AI provider
Set your LLM model and API key:
Strix automatically saves your configuration to
~/.strix/cli-config.json, so you don’t need to re-enter it on every run.What happens during a scan
When you run Strix, here’s what happens:- Environment setup - Strix validates your configuration and pulls the Docker image if needed
- LLM warm-up - Tests connection to your LLM provider
- Target analysis - Determines target type (code, web app, repository)
- Agent orchestration - Launches specialized security testing agents
- Vulnerability discovery - Agents explore, test, and validate findings
- Proof-of-concept creation - Generates PoCs for discovered vulnerabilities
- Report generation - Creates detailed reports with reproduction steps
strix_runs/<run-name> with:
- JSON vulnerability reports
- Proof-of-concept code
- HTTP request/response logs
- Agent execution traces
Understanding the output
Interactive mode (default)
By default, Strix runs in interactive mode with a text-based UI:- Live agent activity - Watch agents work in real-time
- Vulnerability feed - See findings as they’re discovered
- Logs and traces - Detailed execution information
- Progress tracking - Visual status of scan progress
Ctrl+C to exit gracefully.
Non-interactive mode
For CI/CD and automation, use the-n flag:
- Prints vulnerability findings to stdout
- Exits automatically when complete
- Returns exit code
2if vulnerabilities found - Returns exit code
0if no vulnerabilities
Next steps
Now that you’ve run your first scan, explore these topics:Installation methods
Learn about pip install, Docker options, and Python requirements
Basic usage
Understand target types and common testing patterns
Scan modes
Configure quick, standard, or deep scan modes
Custom instructions
Guide agents to focus on specific vulnerabilities or areas
LLM providers
Configure OpenAI, Anthropic, Google, or local models
CI/CD integration
Add Strix to your deployment pipeline
Common issues
Docker not running
Docker not running
If you see “Docker connection failed”, ensure Docker Desktop is running:If this fails, start Docker Desktop and try again.
LLM connection failed
LLM connection failed
Verify your API key is correct and has sufficient credits:Test your provider’s API directly or check their status page.
Image pull takes too long
Image pull takes too long
The Docker image is ~2GB and only downloads on first run. Subsequent runs are instant.If the download is interrupted, remove the partial image and retry:
Need more help? Join our Discord community or check troubleshooting.