Evidence-first CLI security validation platform. Break it before they do — with proof.
Strike is a Rust-powered CLI security validation platform designed for penetration testers, red team operators, AppSec engineers, and security researchers. It provides evidence-first, reproducible security testing with standards-mapped findings.
- Evidence-First: Every finding includes validated proof-of-concept with full HTTP traces
- Reproducible: Deterministic runs with checkpoint support and replay capability
- Standards-Mapped: Automatic mapping to OWASP Top 10, API Security Top 10, WSTG, ASVS, and CVSS v4.0
- High Performance: Built in Rust with async/await for parallel execution (up to 64 concurrent workers)
- CI/CD Native: SARIF output, policy gates, and exit codes for pipeline integration
- Multi-Agent Architecture: Specialized agents for recon, auth, validation, evidence, and reporting
- Safety by Default: Production environment blocks, scope validation, and ROE enforcement
cargo install strikegit clone https://github.com/xaseai/strike cd strike cargo build --releasestrike init --target https://staging.example.com --env stagingstrike recon --target https://staging.example.com --subdomains --ports --tech-detectstrike run --profile full --workers 16 --rate-limit 50strike findings --severity critical --status confirmed --format tablestrike report --format sarif --confirmed-only --include-evidencestrike init- Initialize a new engagement workspacestrike run- Execute full validation pipelinestrike recon- Standalone reconnaissance phasestrike scan- Targeted vulnerability scanstrike validate- Re-validate a specific findingstrike retest- Retest after remediation
strike status- Show current run statusstrike findings- Query and filter findingsstrike report- Generate reports (JSON, Markdown, SARIF, HTML, PDF)strike config- Manage workspace configurationstrike benchmark- Run against test targets (OWASP Juice Shop, WebGoat)
strike ci- CI/CD mode with policy gates
- IDOR/BOLA
- BFLA (Broken Function Level Authorization)
- Privilege Escalation
- Path Traversal
- Mass Assignment
- SQL Injection
- NoSQL Injection
- OS Command Injection
- SSTI (Server-Side Template Injection)
- XPath/LDAP Injection
- Broken Authentication
- Session Fixation
- Token Forgery
- JWT Weaknesses
- OAuth2 Misconfigurations
- 2FA Bypass
- XSS (Reflected, Stored, DOM)
- CSRF
- Clickjacking
- Open Redirect
- SSRF
- XXE
- Deserialization
- File Upload Abuse
- Race Conditions
- Mass Data Exposure
- Unrestricted Resource Consumption
- Security Misconfiguration
- Improper Asset Management
Strike uses a strike.toml configuration file:
target = "https://staging.example.com" env = "staging" profile = "full" workers = 16 rate_limit = 50 [llm] provider = "anthropic" model = "claude-sonnet-4-6" max_tokens_per_agent = 4096 [sandbox] driver = "docker" network_allowlist = ["staging.example.com"] [output] dir = "./.strike/runs" formats = ["json", "md", "sarif"]- JSON: Machine-readable findings bundle
- Markdown: Developer-friendly report
- SARIF: CI/CD integration (GitHub Security, GitLab, etc.)
- HTML: Standalone report
- PDF: Audit-ready documentation
Each validated finding includes:
- Proof of Concept: Full HTTP request/response traces
- CVSS v4.0 Score: Automated scoring with environmental tuning
- Standards Mapping: OWASP, ASVS, CWE references
- Remediation Guidance: Developer-ready fix suggestions
- Retest History: Track fix validation over time
- Authorization: ROE reference and approval metadata
Strike enforces mandatory safety guardrails:
- Scope Validation: All targets must be explicitly authorized
- Environment Protection: Production environments blocked by default
- Rate Limiting: Configurable request throttling
- ROE Enforcement: Rules of Engagement validated before execution
- Evidence Sanitization: Automatic PII/credential redaction
Legal Notice: Strike is designed exclusively for authorized security testing. Use only on systems you own or have explicit written permission to test.
- Runtime: Tokio async runtime for high concurrency
- Storage: SQLite (local) or PostgreSQL (team mode)
- HTTP Client: reqwest with rustls (no OpenSSL dependency)
- Sandbox: Docker isolation with network allowlisting
- Observability: OpenTelemetry tracing and structured logging
- Scan Startup: < 100ms cold start
- Concurrent Workers: Up to 64 parallel tasks
- Memory Footprint: < 30MB RSS idle
- HTTP Throughput: 10,000+ req/s
- Report Generation: < 2s for full evidence bundle
- ✅ Core CLI framework
- ✅ Multi-agent architecture
- ✅ SQLite storage
- ✅ Evidence bundle schema
- ✅ CVSS v4.0 scoring
- ✅ JSON/Markdown/SARIF reports
- Durable workflow state with checkpointing
- Full WSTG + PTES mapping
- LLM-powered hypothesis generation
- Root cause analysis
- PostgreSQL team mode
- Human-in-the-loop review workflow
- RBAC for team workspaces
- Air-gapped deployment mode
- Comprehensive ASVS coverage
Contributions are welcome! Please read our contributing guidelines and code of conduct.
Strike is licensed under the Business Source License 1.1 (BSL-1.1). See LICENSE for details.
- Documentation: https://docs.strike.dev
- Issues: https://github.com/xaseai/strike/issues
- Discussions: https://github.com/xaseai/strike/discussions
Strike follows OWASP, PTES, and ASVS best practices. Built with Rust for performance and safety.
Strike - Evidence-first security validation. Break it before they do.