Skip to main content

Cyberstrike is now open source! AI-powered penetration testing for security professionals. Star on GitHub

Cyberstrike Agent

The cyberstrike agent is the default primary agent. It provides AI-powered offensive security testing with full tool access and can delegate to specialized subagents for domain-specific tasks.

Overview

When you run cyberstrike without specifying an agent, the cyberstrike agent starts automatically. It is a general-purpose offensive security agent designed to handle a wide range of tasks — from reconnaissance and vulnerability assessment to exploitation and reporting.

Agent Configuration

PropertyValue
Agent IDcyberstrike
Modeprimary
Tool AccessFull (all tools allowed)
Can Ask QuestionsYes

Launch the Agent

Since cyberstrike is the default agent, no flag is required:

Terminal window
# Start with the default cyberstrike agent
cyberstrike
# Explicitly specify the agent
cyberstrike --agent cyberstrike
# One-time run
cyberstrike run "scan target.example.com for web vulnerabilities"

Capabilities

The cyberstrike agent has access to all available tools and is not restricted to a specific security domain. It can:

  • Perform web application security testing
  • Conduct cloud infrastructure audits
  • Execute network penetration testing
  • Run automated scans with tools like Nuclei, Nmap, and SQLMap
  • Browse and interact with web applications
  • Read, write, and analyze files
  • Ask clarifying questions when the task is ambiguous

Delegating to Specialized Agents

When a task requires deep domain expertise, the cyberstrike agent can invoke specialized subagents:

SubagentWhen Used
web-applicationOWASP WSTG methodology, browser-based testing
cloud-securityAWS, Azure, GCP infrastructure audits
internal-networkActive Directory attacks, network pivoting
proxy-agentHTTP proxy-based vulnerability testing
generalResearch, multi-step parallel tasks
exploreCodebase and file system exploration

Delegation happens automatically based on the task. You can also invoke agents directly with @agent-name:

@web-application test the login form for injection vulnerabilities
@cloud-security audit the AWS S3 buckets for public access

Permission Model

The cyberstrike agent uses the broadest permission set:

  • All tools are allowed by default
  • Can ask clarifying questions (question: allow)
  • .env files require confirmation before reading
  • External directory access outside the project requires confirmation
  • User-configured deny rules in cyberstrike.json are always respected

Example Session

You: Test the web application at https://app.example.com for common vulnerabilities
Agent: I'll start with reconnaissance and then test for OWASP Top 10 vulnerabilities.
[Fingerprinting web server...]
Server: Apache/2.4.51
Framework: PHP/Laravel
Authentication: JWT-based
[Launching web-application subagent for WSTG testing...]
[Scanning with Nuclei...]
Found 3 medium-severity findings:
- Missing Content-Security-Policy header
- Server version disclosure in headers
- X-Frame-Options not set
[Testing authentication...]
⚠ FINDING: JWT Algorithm Confusion
Location: Authorization header
Severity: Critical (CVSS 9.8)

Configuration

Set as Default Agent

The cyberstrike agent is the default and requires no configuration. To explicitly set it:

cyberstrike.json
{
"agent": "cyberstrike"
}

Custom Instructions

Add project-specific context:

cyberstrike.json
{
"agent": "cyberstrike",
"instructions": "This is a Node.js REST API. Focus on authentication, IDOR, and injection vulnerabilities."
}