Strike
Evidence-first CLI security validation platform. Break it before they do — with proof.
Strike is a Rust-powered CLI security validation platform designed for penetration testers, red team operators, AppSec engineers, and security researchers. It provides evidence-first, reproducible security testing with standards-mapped findings.
Features
- Evidence-First: Every finding includes validated proof-of-concept with full HTTP traces
- Reproducible: Deterministic runs with checkpoint support and replay capability
- Standards-Mapped: Automatic mapping to OWASP Top 10, API Security Top 10, WSTG, ASVS, and CVSS v4.0
- High Performance: Built in Rust with async/await for parallel execution (up to 64 concurrent workers)
- CI/CD Native: SARIF output, policy gates, and exit codes for pipeline integration
- Multi-Agent Architecture: Specialized agents for recon, auth, validation, evidence, and reporting
- Safety by Default: Production environment blocks, scope validation, and ROE enforcement
Installation
From crates.io
From source
Quick Start
1. Initialize a workspace
2. Run reconnaissance
3. Execute full validation pipeline
4. View findings
5. Generate reports
CLI Commands
Core Commands
strike init- Initialize a new engagement workspacestrike run- Execute full validation pipelinestrike recon- Standalone reconnaissance phasestrike scan- Targeted vulnerability scanstrike validate- Re-validate a specific findingstrike retest- Retest after remediation
Management Commands
strike status- Show current run statusstrike findings- Query and filter findingsstrike report- Generate reports (JSON, Markdown, SARIF, HTML, PDF)strike config- Manage workspace configurationstrike benchmark- Run against test targets (OWASP Juice Shop, WebGoat)
CI/CD Integration
strike ci- CI/CD mode with policy gates
Vulnerability Classes Supported
Access Control
- IDOR/BOLA
- BFLA (Broken Function Level Authorization)
- Privilege Escalation
- Path Traversal
- Mass Assignment
Injection
- SQL Injection
- NoSQL Injection
- OS Command Injection
- SSTI (Server-Side Template Injection)
- XPath/LDAP Injection
Authentication & Session
- Broken Authentication
- Session Fixation
- Token Forgery
- JWT Weaknesses
- OAuth2 Misconfigurations
- 2FA Bypass
Client-Side
- XSS (Reflected, Stored, DOM)
- CSRF
- Clickjacking
- Open Redirect
Server-Side
- SSRF
- XXE
- Deserialization
- File Upload Abuse
- Race Conditions
API-Specific
- Mass Data Exposure
- Unrestricted Resource Consumption
- Security Misconfiguration
- Improper Asset Management
Configuration
Strike uses a strike.toml configuration file:
= "https://staging.example.com"
= "staging"
= "full"
= 16
= 50
[]
= "anthropic"
= "claude-sonnet-4-6"
= 4096
[]
= "docker"
= ["staging.example.com"]
[]
= "./.strike/runs"
= ["json", "md", "sarif"]
Output Formats
- JSON: Machine-readable findings bundle
- Markdown: Developer-friendly report
- SARIF: CI/CD integration (GitHub Security, GitLab, etc.)
- HTML: Standalone report
- PDF: Audit-ready documentation
Evidence Bundle Schema
Each validated finding includes:
- Proof of Concept: Full HTTP request/response traces
- CVSS v4.0 Score: Automated scoring with environmental tuning
- Standards Mapping: OWASP, ASVS, CWE references
- Remediation Guidance: Developer-ready fix suggestions
- Retest History: Track fix validation over time
- Authorization: ROE reference and approval metadata
Safety & Ethics
Strike enforces mandatory safety guardrails:
- Scope Validation: All targets must be explicitly authorized
- Environment Protection: Production environments blocked by default
- Rate Limiting: Configurable request throttling
- ROE Enforcement: Rules of Engagement validated before execution
- Evidence Sanitization: Automatic PII/credential redaction
Legal Notice: Strike is designed exclusively for authorized security testing. Use only on systems you own or have explicit written permission to test.
Architecture
- Runtime: Tokio async runtime for high concurrency
- Storage: SQLite (local) or PostgreSQL (team mode)
- HTTP Client: reqwest with rustls (no OpenSSL dependency)
- Sandbox: Docker isolation with network allowlisting
- Observability: OpenTelemetry tracing and structured logging
Performance Targets
- Scan Startup: < 100ms cold start
- Concurrent Workers: Up to 64 parallel tasks
- Memory Footprint: < 30MB RSS idle
- HTTP Throughput: 10,000+ req/s
- Report Generation: < 2s for full evidence bundle
Roadmap
Phase 1 (Current - v0.1.0)
- ✅ Core CLI framework
- ✅ Multi-agent architecture
- ✅ SQLite storage
- ✅ Evidence bundle schema
- ✅ CVSS v4.0 scoring
- ✅ JSON/Markdown/SARIF reports
Phase 2 (v0.2.0)
- Durable workflow state with checkpointing
- Full WSTG + PTES mapping
- LLM-powered hypothesis generation
- Root cause analysis
- PostgreSQL team mode
Phase 3 (v0.3.0)
- Human-in-the-loop review workflow
- RBAC for team workspaces
- Air-gapped deployment mode
- Comprehensive ASVS coverage
Contributing
Contributions are welcome! Please read our contributing guidelines and code of conduct.
License
Strike is licensed under the Business Source License 1.1 (BSL-1.1). See LICENSE for details.
Support
- Documentation: https://docs.strike.dev
- Issues: https://github.com/xaseai/strike/issues
- Discussions: https://github.com/xaseai/strike/discussions
Acknowledgments
Strike follows OWASP, PTES, and ASVS best practices. Built with Rust for performance and safety.
Strike - Evidence-first security validation. Break it before they do.