Your First Scan
Run a basic security assessment by specifying a target:The
--target flag (or -t for short) is required. Strix automatically detects the target type based on the format you provide.Understanding the Output
When you run Strix, you’ll see a rich terminal interface (TUI) that displays:- Real-time progress of agent activities
- Vulnerability discoveries as they’re found
- Detailed exploit validation results
- Agent collaboration and coordination
Results Location
All scan results are saved to a timestamped directory:First run automatically pulls the Strix Docker image. This only happens once and may take a few minutes.
Interactive vs Non-Interactive Mode
Strix runs in two modes:Interactive Mode (Default)
Provides a real-time TUI with agent activity, findings, and detailed progress:- Live agent collaboration
- Vulnerability findings as they’re discovered
- Attack surface mapping progress
- Real-time exploit validation
Non-Interactive Mode
Perfect for CI/CD pipelines, servers, and automated workflows:- No TUI, prints findings to stdout
- Exits automatically on completion
- Returns exit code 2 if vulnerabilities are found
- Returns exit code 0 if no vulnerabilities are found
- Ideal for automation and scripting
Target Types
Strix automatically detects and handles different target types:Local Code Analysis
Test applications on your local filesystem:Repository Analysis
Strix clones and analyzes GitHub repositories:Web Applications
Black-box testing of deployed applications:Domains and IPs
Infrastructure and network penetration testing:Common Usage Patterns
Quick Security Check
Run a fast assessment for rapid feedback:Standard Development Testing
Routine security testing during development:Thorough Security Review
Deep analysis before production deployment:The default scan mode is
deep, which provides the most comprehensive security assessment.Version Information
Check your installed Strix version:Next Steps
Scan Modes
Learn about quick, standard, and deep scan modes
Custom Instructions
Guide Strix to focus on specific vulnerabilities
Multi-Target Testing
Test multiple targets in a single scan
Advanced Testing
Authenticated testing and complex scenarios