DOCUMENTATION

IntelStrike Docs

Everything you need to integrate AI security scanning into your stack — from quick start to full API reference.

Introduction

IntelStrike is the autonomous security testing platform that covers OWASP LLM Top 10, web application vulnerabilities, and API security — in one scanner. Run 210+ probes across 21 vulnerability categories against LLM endpoints, RAG pipelines, agent frameworks, web applications, and REST APIs.

IntelStrike works with any LLM provider — OpenAI, Anthropic, Azure, Cohere, self-hosted models, and custom agent frameworks.

MIT Technology Review (March 2026) highlighted how AI is accelerating cybercrime: PromptLock polymorphic ransomware, LLM-generated phishing at scale, deepfake social engineering, and guardrail jailbreaking via CTF pretexting. IntelStrike's emerging threat categories (GUARD, OSMODEL, CODEAGENT, SOCIAL) address these new attack vectors — testing your systems against the same techniques criminals are now using.

Key Capabilities

  • 210+ security probes across 27 vulnerability categories (LLM, Web, API, Agent-to-Agent, Emerging Threats, Supply Chain)
  • Autonomous Red Teaming Engine — multi-turn, AI-powered adaptive attack sequences with budget management
  • Full OWASP LLM Top 10 coverage (LLM01–LLM10) plus RAG and AI Agent attack categories
  • Full OWASP Web Top 10 coverage (WEB01–WEB10) — SQL injection, XSS, SSRF, RCE, XXE, path traversal, CSRF, open redirect, and more
  • 13 scan profiles: quick, owasp-llm-top10, rag-full, agent-strict, agent-network, autonomous, owasp-web-top10, api-security, full-spectrum, guardrail-audit, open-source-audit, coding-agent, social-engineering
  • Parallel probe execution for 5x faster scans
  • Zero-code setup — register your target and start scanning from the dashboard
  • REST API for programmatic access (power users)
  • Real-time dashboard with KPIs, vulnerability tracking, usage analytics, and SSE progress streaming
  • SARIF 2.1.0 output for GitHub Security tab and security tool interoperability
  • HTML report export — printable, self-contained, compliance-ready
  • Native integrations with Slack, Jira, Linear, PagerDuty, GitHub, Teams, Datadog, and generic webhooks with HMAC-SHA256 signing
  • Role-based access control (RBAC) with owner/admin/member/viewer roles
  • Enterprise audit logs with filtering, pagination, and CSV export
  • CI/CD integration via REST API with GitHub Actions and GitLab CI examples
  • Stripe-integrated billing with Free, Pro, and Enterprise tiers
  • Compliance mapping: SOC 2, PCI DSS v4.0, ISO 27001:2022, GDPR, NIST CSF 2.0
  • Continuous Monitoring: register a target once, auto-discover endpoints, rotate scan profiles, encrypted credentials (AES-256-GCM)
  • Business Logic Testing: pricing logic, auth/permission, and workflow/concurrency probes with a natural-language assertion builder
  • Email notifications: critical alerts, scan completion, weekly digest

How It Works

IntelStrike sends adversarial probes against your AI endpoints, analyzes the responses for vulnerabilities, and classifies findings by OWASP LLM attack vector. Each finding includes a severity rating, evidence of the vulnerability, and step-by-step remediation guidance.

Getting Started

Get up and running with IntelStrike in under 5 minutes. No SDK or CLI to install — everything runs from the dashboard.

1. Create Your Account

Sign up at intel-strike.com. You'll get immediate access to the dashboard where you can manage targets, scans, and findings.

2. Add Your Target

Navigate to Dashboard → Monitoring and paste your target URL. This can be any web app, API, or LLM endpoint. Our discovery engine will automatically map all endpoints and surfaces.

If your app requires a login, toggle 'Requires login' and provide an email + password. IntelStrike will authenticate before scanning authenticated routes.

3. Start the Scan

Click 'Start Scan'. IntelStrike automatically selects the best scan profile for your target and runs 210+ security probes. No configuration needed.

4. Review Findings

Findings appear in your dashboard with severity ratings (Critical, High, Medium, Low), OWASP classification, evidence, and step-by-step remediation guidance.

You can also trigger scans via the REST API for CI/CD integration. See the API Reference section for details.

Tutorial: Scan Your First Target

This tutorial walks you through scanning OWASP Juice Shop — a deliberately vulnerable web application perfect for testing IntelStrike's capabilities. You'll deploy it locally, run a full security scan, review findings, and export a report.

This tutorial uses OWASP Juice Shop, a legal target for security testing. Never scan systems without authorization.

Step 1: Deploy OWASP Juice Shop

Juice Shop is a realistic vulnerable application that runs on Node.js. Deploy it locally using Docker:

Run Juice Shop in Docker

bash
docker run -d --name juice-shop -p 3000:3000 bkimminich/juice-shop

Verify it's running:

bash
curl http://localhost:3000

Alternatively, install via npm if you prefer:

bash
npm install juice-shop
npx juice-shop

Step 2: Create an IntelStrike Account

If you haven't already, sign up at intelstrike.uk and create an API key from the dashboard.

bash
export INTELSTRIKE_API_KEY=isk_live_...

Step 3: Configure Your Scan

Navigate to Dashboard → Monitoring in the IntelStrike dashboard. For Juice Shop, configure:

FieldValue
Target URLhttp://localhost:3000
Credentials(none required for Juice Shop public routes)

Or via REST API:

bash
curl -X POST https://api.intel-strike.com/v1/scans \
-H "Authorization: Bearer $INTELSTRIKE_API_KEY" \
-H "Content-Type: application/json" \
-d '{
"endpoint": "http://localhost:3000"
}'

Step 4: Run the Scan

Click 'Start Scan' in the dashboard. IntelStrike will execute 50+ probes covering:

  • SQL Injection (including JSON field name injection)
  • Cross-Site Scripting (reflected, event-handler, javascript: URL)
  • Server-Side Request Forgery (AWS/GCP metadata, localhost)
  • Authentication Bypass and IDOR
  • Command Injection and RCE
  • Security Header checks
  • Path Traversal
  • Open Redirect

The scan typically takes 2-5 minutes depending on your target.

Step 5: Review Findings

Once complete, you'll see findings organized by severity:

SeverityDescription
CriticalVulnerabilities allowing unauthorized access, data breach, or RCE
HighHigh-impact vulnerabilities with specific conditions
MediumModerate impact vulnerabilities
LowInformational findings or low-priority issues
InfoUseful information for auditing

Each finding includes:

  • OWASP category (e.g., WEB01: SQL Injection)
  • Attack vector and payload used
  • Confidence score (0-100%)
  • Evidence from the response
  • Step-by-step remediation guidance
  • References to official documentation

Step 6: Export Your Report

Download reports from the dashboard or via API:

Download PDF report

bash
curl -H "Authorization: Bearer $INTELSTRIKE_API_KEY" \
https://api.intel-strike.com/v1/scans/{scanId}/report \
-o report.pdf

Download SARIF for GitHub Security tab

bash
curl -H "Authorization: Bearer $INTELSTRIKE_API_KEY" \
https://api.intel-strike.com/v1/scans/{scanId}/sarif \
-o results.sarif

Next Steps

  • Scan your own APIs using the techniques learned here
  • Explore other scan profiles like owasp-llm-top10 for AI endpoints
  • Set up scheduled scans for continuous security monitoring
  • Integrate with Slack, Jira, or Linear for team notifications
  • Review the full documentation for advanced features

API Reference

The IntelStrike REST API is available at https://api.intel-strike.com/v1. All requests require an API key passed in the Authorization header.

Authentication

bash
curl https://api.intel-strike.com/v1/scans \
-H "Authorization: Bearer isk_live_..."

Endpoints

MethodPathDescription
POST/v1/scansCreate a new scan
GET/v1/scansList scans
GET/v1/scans/:idGet scan by ID
DELETE/v1/scans/:idCancel a scan
GET/v1/scans/:id/findingsGet findings for a scan
GET/v1/scans/:id/sarifDownload SARIF 2.1.0 report
GET/v1/scans/:id/reportDownload HTML report (printable PDF)
GET/v1/vulnerabilitiesList all vulnerabilities
POST/v1/api-keysCreate an API key
GET/v1/api-keysList API keys
DELETE/v1/api-keys/:idRevoke an API key
POST/v1/webhooksRegister a webhook
GET/v1/webhooksList webhooks
DELETE/v1/webhooks/:idDelete a webhook

Create a Scan

POST /v1/scans accepts the following body parameters:

FieldTypeRequiredDescription
endpointstringYesTarget URL to scan
profilestringYesScan profile (see Scan Profiles)
projectIdstringNoProject to associate the scan with
requestType"llm" | "web" | "api"NoTarget type — defaults to llm
method"GET" | "POST" | "PUT" | "DELETE" | "PATCH"NoHTTP method for web/API scans — defaults to POST
injectIn"body" | "query" | "header" | "path"NoWhere to inject payloads for web/API scans — defaults to body
targetHeadersobjectNoCustom headers forwarded with each probe request
targetDescriptionstringNoDescription of the target for autonomous mode context
budgetobjectNo{ maxTokens, maxTurns } — autonomous mode budget control
bash
# LLM endpoint scan
curl -X POST https://api.intel-strike.com/v1/scans \
-H "Authorization: Bearer isk_live_..." \
-H "Content-Type: application/json" \
-d '{
"projectId": "proj_abc123",
"endpoint": "https://your-api.com/chat",
"profile": "owasp-llm-top10",
"requestType": "llm",
"targetHeaders": {
"Authorization": "Bearer your-llm-key"
}
}'
# Web application scan
curl -X POST https://api.intel-strike.com/v1/scans \
-H "Authorization: Bearer isk_live_..." \
-H "Content-Type: application/json" \
-d '{
"endpoint": "https://your-app.com/search",
"profile": "owasp-web-top10",
"requestType": "web",
"method": "GET",
"injectIn": "query"
}'
# Autonomous red teaming scan
curl -X POST https://api.intel-strike.com/v1/scans \
-H "Authorization: Bearer isk_live_..." \
-H "Content-Type: application/json" \
-d '{
"projectId": "proj_abc123",
"endpoint": "https://your-api.com/chat",
"profile": "autonomous",
"requestType": "llm",
"targetDescription": "Customer support chatbot with tool access",
"budget": { "maxTokens": 100000, "maxTurns": 10 }
}'

Response Format

json
{
"id": "scn_abc123",
"status": "completed",
"profile": "owasp-llm-top10",
"endpoint": "https://your-api.com/chat",
"created_at": "2026-03-18T10:00:00Z",
"completed_at": "2026-03-18T10:04:32Z",
"summary": {
"total_findings": 7,
"critical": 1,
"high": 2,
"medium": 3,
"low": 1
},
"findings": [
{
"id": "fnd_xyz789",
"owasp_id": "LLM01",
"title": "Direct Prompt Injection",
"severity": "critical",
"evidence": "...",
"remediation": "..."
}
]
}

Rate Limits

PlanScans/monthProfilesConcurrent Scans
Free5quick only1
Pro ($49/endpoint/mo)UnlimitedAll (including autonomous)5
EnterpriseUnlimitedAll + customUnlimited

Rate-limited responses return HTTP 429 with a Retry-After header.

Configuration

IntelStrike is configured primarily through the dashboard. For CI/CD and API usage, configuration is done via environment variables and API request parameters.

Environment Variables (CI/CD)

Set these in your CI/CD environment to trigger scans via the REST API:

VariableDescriptionRequired
INTELSTRIKE_API_KEYYour IntelStrike API key (Dashboard → API Keys)Yes
INTELSTRIKE_ENDPOINTTarget URL to scanYes

Scan Profiles

ProfileTargetCategories CoveredEst. TimeUse Case
quickLLM/AILLM01, LLM06~30sFast smoke test — prompt injection & data disclosure
owasp-llm-top10LLM/AILLM01–LLM10~3–5 minFull OWASP LLM Top 10 coverage
rag-fullRAG pipelinesLLM01, LLM06, LLM08, RAG~3–5 minRAG-specific: poisoning, retrieval, context manipulation
agent-strictAI agentsLLM01, LLM06–08, AGENT~5–10 minAI agent security: tool abuse, excessive agency
agent-networkMulti-agentLLM01, LLM06, LLM08, AGENT, A2A~10–15 minInter-agent attacks: identity spoofing, delegation abuse, trust chain exploitation
autonomousLLM/AILLM01, LLM02, LLM04, LLM06, LLM08, RAG, AGENT, A2A~10–15 minAI-powered multi-turn adaptive red teaming
owasp-web-top10Web appsWEB01–WEB10~3–5 minFull OWASP Web Top 10: SQLi, XSS, SSRF, RCE, XXE, and more
api-securityREST APIsWEB01, WEB04, WEB07~2–3 minAuth bypass, injection, and header checks for REST/GraphQL APIs
full-spectrumAI web appsAll LLM + All Web (22 categories)~8–12 minCombined coverage for AI-powered web applications
guardrail-auditLLM/AIGUARD, LLM01, LLM06~3–5 minMIT Tech Review: CTF pretexting, content filter bypass, instruction hierarchy
open-source-auditOpen-source LLMsOSMODEL, LLM01, LLM06~3–5 minNo safety layer, quantization issues, fine-tuning vulnerabilities
coding-agentAI coding assistantsCODEAGENT, LLM01, LLM06, LLM05~3–5 minSupply chain risks, backdoor code, secret leakage in AI suggestions
social-engineeringLLM/AISOCIAL, GUARD~3–5 minAI-generated phishing, pretexting, authority impersonation detection

OWASP LLM Top 10

IntelStrike provides full coverage of the OWASP Top 10 for LLM Applications. Every attack vector is automated, classified, and includes remediation guidance.

IDNameDescription
LLM01Prompt InjectionDirect & indirect injection via user input, documents, and RAG context
LLM02Insecure Output HandlingUnescaped model output rendered in downstream systems or UIs
LLM03Training Data PoisoningAdversarial data in fine-tuning or RAG corpora affecting model behavior
LLM04Model Denial of ServiceResource exhaustion via recursive prompting or unbounded token consumption
LLM05Supply Chain VulnerabilitiesCompromised model weights, plugins, or third-party LLM integrations
LLM06Sensitive Data DisclosurePII, secrets, or system context leaked through completions
LLM07Insecure Plugin DesignOver-permissive function calling, tool misuse, and missing auth checks
LLM08Excessive AgencyAgent autonomy beyond intended scope — unconstrained tool or API access
LLM09OverrelianceBusiness processes dependent on unverified model output without human oversight
LLM10Model TheftSystematic querying to replicate proprietary model behavior

IntelStrike continuously updates its probe library as new attack vectors are discovered. Coverage extends beyond the OWASP Top 10 with emerging threat modules.

Supply Chain Security

Supply chain attacks have become one of the most critical threats to AI/ML infrastructure. The TeamPCP campaign (March 2026) compromised Trivy, LiteLLM, and multiple npm packages, demonstrating how attackers target trusted tools to reach downstream victims. IntelStrike provides comprehensive supply chain security coverage to protect your dependencies.

Recent Supply Chain Incidents

IncidentDateAffected VersionsImpact
Telnyx SDKMarch 20264.87.1, 4.87.2Malicious code with C2 exfiltration via WAV steganography
LiteLLMMarch 20261.82.7, 1.82.8.pth backdoor, data exfiltration, Kubernetes lateral movement
TrivyMarch 2026Compromised CI/CDUsed as entry point to compromise downstream packages

Supply Chain Categories

IDNameProbesDescription
SUPPLY01Package Integrity Check5Detects known vulnerable and compromised package versions
SUPPLY02IOC Network Detection5Identifies connections to known malicious IPs and domains
SUPPLY03Dependency Lockfile Scanner5Scans lockfiles for vulnerable dependencies and unpinned packages
SUPPLY04.pth File Anomaly5Detects malicious Python path configuration files
SUPPLY05Registry Poisoning5Identifies typosquatting and namespace confusion attacks
A2A-TRUSTAgent Trust Chain5Validates trust chain integrity between AI agents

How to Scan Your Dependencies

Use the Dashboard or API to scan your lockfiles for vulnerabilities:

Scan requirements.txt via API

bash
curl -X POST https://intelstrike.uk/api/v1/package-check \
-H "Authorization: Bearer isk_live_..." \
-H "Content-Type: application/json" \
-d '{
"lockfile": "requests==2.31.0\ntelnyx==4.87.1\nnumpy==1.24.0",
"registry": "pypi"
}'

Scan package-lock.json via API

bash
curl -X POST https://intelstrike.uk/api/v1/package-check \
-H "Authorization: Bearer isk_live_..." \
-H "Content-Type: application/json" \
-d '{
"lockfile": "<package-lock.json content>",
"registry": "npm"
}'

Using the Dashboard

Navigate to Dashboard → Supply Chain to upload lockfiles, view vulnerabilities, and export compliance reports. The dashboard provides a visual overview of your dependency security posture.

Compliance Coverage

CategorySOC 2PCI DSS v4.0ISO 27001:2022NIST CSF 2.0
SUPPLY01-05CC6.1, CC7.13.4, 6.2.4A.8.7, A.8.24PR.SC-1, PR.SC-2
A2A-TRUSTCC6.1, CC6.2, CC6.66.2.4, 7.2.1A.5.14, A.5.15PR.AC-1, PR.AC-2

Supply chain attacks can happen in hours. Enable continuous monitoring and scan dependencies regularly — especially after any package update or new dependency addition.

Continuous Monitoring

Continuous Monitoring lets you register a target once and have IntelStrike's agents scan it automatically — discovering endpoints, rotating scan profiles, and reporting vulnerabilities without manual intervention.

How It Works

  1. Register your target URL with optional credentials (Bearer token, API key, or cookie) — credentials are encrypted at rest with AES-256-GCM.
  2. Enable auto-discovery: IntelStrike crawls your target to find all endpoints (sitemap.xml, robots.txt, OpenAPI/Swagger specs, GraphQL introspection, HTML forms, internal links, and common paths).
  3. Choose a frequency (every 6 hours, every 12 hours, daily, weekly, or monthly) and set the profile to Auto-Rotate.
  4. Agents scan continuously, cycling through profiles relevant to your target type (LLM, Web, API, A2A). Deep scans (autonomous / full-spectrum) run weekly.
  5. Vulnerabilities are reported in real-time via your configured integrations (Slack, Jira, Linear, PagerDuty, webhooks).

Target Types

TypeDescriptionProfiles Rotated
LLM / AIChat endpoints, completion APIsquick → owasp-llm-top10 → autonomous
WebWeb applications, HTML formsowasp-web-top10 → full-spectrum
APIREST APIs, GraphQLapi-security → owasp-web-top10 → full-spectrum
A2AMulti-agent systemsagent-network → agent-strict → full-spectrum

Profile Rotation

When the profile is set to Auto-Rotate, IntelStrike cycles through all profiles relevant to your target type, avoiding repeats. Once per week (on Sundays), a deep scan runs using the autonomous or full-spectrum profile for maximum coverage.

Auto-Discovery

When enabled, IntelStrike re-discovers your target's endpoints every 24 hours. Discovery sources include:

  • sitemap.xml parsing
  • robots.txt path extraction
  • OpenAPI / Swagger spec detection (7 common paths)
  • GraphQL endpoint detection
  • HTML form action URLs
  • Internal link crawling (1 level deep)
  • Common endpoint probing (/api, /graphql, /health, /admin, etc.)

Credential Security

Credentials are encrypted with AES-256-GCM before storage. The encryption key is stored as an environment variable (ENCRYPTION_KEY) and never committed to source control. The API never returns credential values — only the auth type (bearer, api-key, cookie, or none) is exposed.

Use the 'Run Now' button on any monitored target to trigger an immediate scan without waiting for the next scheduled run.

Dashboard API

Create a monitored target via API

bash
curl -X POST https://intelstrike.uk/api/dashboard/scheduled-scans \
-H "Authorization: Bearer <session>" \
-H "Content-Type: application/json" \
-d '{
"name": "Production API",
"endpoint": "https://api.example.com",
"targetType": "api",
"profile": "auto",
"frequency": "daily",
"autoDiscover": true,
"auth": { "type": "bearer", "token": "sk-..." }
}'

Continuous Monitoring requires the Pro plan or higher. Free and Starter plans support manual scans only.

Business Logic Testing

Business Logic Testing targets application-specific rules that traditional vulnerability scanners miss — pricing errors, permission bypasses, and workflow race conditions. Define assertions in plain English and let IntelStrike probe your endpoints automatically.

Probe Categories

CategoryWhat It TestsDefault Assertions
Pricing LogicDiscount calculations, coupon stacking, cart totalsPrice non-negative, coupon non-cumulative, price integrity after discount
Auth & PermissionsRole escalation, tenant boundaries, admin accessAdmin routes restricted, user data isolation between tenants
Workflow & ConcurrencyRace conditions, double-submit, state transitionsInventory consistency under concurrent requests

Natural-Language Assertion Builder

Write assertions in plain language (e.g. "discount must never exceed 50%" or "user A cannot read user B's orders"). IntelStrike translates them into executable checks and runs them against your API.

API Endpoint

Trigger a business logic scan

bash
curl -X POST https://intelstrike.uk/api/dashboard/logic-scans \
-H "Authorization: Bearer <session>" \
-H "Content-Type: application/json" \
-d '{
"endpoint": "https://api.example.com/checkout",
"categories": ["pricing", "auth", "workflow"],
"assertions": ["price must be non-negative", "coupon cannot stack"]
}'

Webhooks & Integrations

Push scan results and findings to your existing tools in real-time. IntelStrike supports webhooks and native integrations with popular platforms.

Webhook Configuration

typescript
const webhook = await client.webhooks.create({
url: "https://your-app.com/webhooks/intelstrike",
events: ["scan.completed", "finding.critical"],
secret: "whsec_...", // Used to verify webhook signatures
});

Webhook Events

EventDescription
scan.startedA scan has begun
scan.completedA scan has finished
scan.failedA scan encountered an error
finding.criticalA critical severity finding was detected
finding.highA high severity finding was detected

Webhook Payload

json
{
"event": "scan.completed",
"timestamp": "2026-03-25T09:00:00Z",
"data": {
"scanId": "scn_abc123",
"endpoint": "https://your-app.com/api/chat",
"profile": "owasp-web-top10",
"riskScore": 74,
"findings": [
{
"id": "fnd_xyz789",
"title": "SQL Injection via JSON field name",
"severity": "critical",
"category": "WEB01"
}
]
},
"signature": "sha256=a1b2c3d4e5f6..."
}

Verifying Signatures (Node.js)

Every webhook delivery includes an X-IntelStrike-Signature header. Verify it with HMAC-SHA256 before processing the payload.

Express.js example

typescript
import crypto from "crypto";
function verifyWebhookSignature(
rawBody: Buffer,
signatureHeader: string,
secret: string
): boolean {
const expected = "sha256=" + crypto
.createHmac("sha256", secret)
.update(rawBody)
.digest("hex");
return crypto.timingSafeEqual(
Buffer.from(expected),
Buffer.from(signatureHeader)
);
}
app.post("/webhooks/intelstrike", express.raw({ type: "*/*" }), (req, res) => {
const sig = req.headers["x-intelstrike-signature"] as string;
if (!verifyWebhookSignature(req.body, sig, process.env.WEBHOOK_SECRET!)) {
return res.status(401).send("Invalid signature");
}
const event = JSON.parse(req.body.toString());
// handle event.event ("scan.completed", "finding.critical", etc.)
res.sendStatus(200);
});

Always verify signatures before processing webhook payloads. Use timing-safe comparison (crypto.timingSafeEqual) to prevent timing attacks.

Native Integrations

PlatformWhat It DoesSetup
SlackBlock Kit notifications with risk scores, finding counts, severity badgesDashboard → Integrations → Connect Slack → Paste incoming webhook URL
JiraAuto-creates Bug issues for critical/high findings with OWASP labels and priorityDashboard → Integrations → Connect Jira → Enter Jira URL, email, API token, project key
LinearAuto-creates issues with priority mapping (urgent/high/medium/low)Dashboard → Integrations → Connect Linear → Enter API key and team ID
PagerDutyTriggers incidents for critical findings via Events API v2Dashboard → Integrations → Connect PagerDuty → Enter routing key
Microsoft TeamsChannel notifications for scan results and vulnerabilitiesDashboard → Integrations → Connect Teams → Paste incoming webhook URL
DatadogSecurity events and metrics for monitoringDashboard → Integrations → Connect Datadog → Enter API key and site
GitHubCI/CD workflow with SARIF upload to GitHub Security tabCopy workflow from Getting Started docs

All integrations fire automatically after each scan completes. Critical and high findings also trigger individual notifications. Configure which events to receive per integration.

SARIF Output

IntelStrike exports scan results in SARIF 2.1.0 (Static Analysis Results Interchange Format), the industry standard for security tools. SARIF files can be uploaded to GitHub Security tab, viewed in VS Code SARIF Viewer, or consumed by any SARIF-compatible tool.

Download SARIF via API

bash
# Via API key
curl -H "Authorization: Bearer isk_live_..." \
https://api.intel-strike.com/api/v1/scan/SCAN_ID/sarif \
-o results.sarif

SARIF in CI/CD

GitHub Actions — upload SARIF to Security tab

yaml
- name: Run IntelStrike Scan
env:
INTELSTRIKE_API_KEY: ${{ secrets.INTELSTRIKE_API_KEY }}
run: |
curl -sf -X POST \
-H "Authorization: Bearer $INTELSTRIKE_API_KEY" \
-H "Content-Type: application/json" \
-d '{"endpoint": "${{ secrets.TARGET_URL }}", "profile": "owasp-llm-top10"}' \
-o results.json \
https://intelstrike.uk/api/v1/scan
# Download SARIF
SCAN_ID=$(cat results.json | grep -o '"id":"[^"]*"' | head -1 | cut -d'"' -f4)
curl -sf -H "Authorization: Bearer $INTELSTRIKE_API_KEY" \
"https://intelstrike.uk/api/v1/scan/$SCAN_ID/sarif" \
-o results.sarif
- name: Upload SARIF
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: results.sarif

SARIF Contents

  • Tool metadata (IntelStrike version, scan profile)
  • Rules with OWASP LLM Top 10 taxonomy relationships
  • Results with severity levels (error, warning, note, none)
  • Invocation metadata (endpoint, duration, success status)
  • Security-severity scores for prioritization

SARIF reports are available in the dashboard via the download button on any completed scan, or programmatically via the API.

RBAC & Audit Logs

IntelStrike includes enterprise-grade access control and compliance features. Role-based access control (RBAC) restricts actions by team role, while audit logs provide a complete trail of all actions taken in your organization.

Role Hierarchy

RolePermissions
OwnerFull access: billing, role changes, all admin/member/viewer actions
AdminManage members, integrations, scans, delete scans, view audit logs
MemberCreate scans, resolve vulnerabilities, manage API keys, view integrations
ViewerView scans, vulnerabilities, download SARIF reports

Permission Examples

ActionMinimum Role
Create a scanMember
Delete a scanAdmin
Manage integrationsAdmin
Change member rolesOwner
Manage billingOwner
View audit logsAdmin
Download SARIFViewer

Audit Logs

Every significant action is recorded in the audit log with: timestamp, user, action type, affected resource, and metadata. Audit logs support filtering by action type and resource, pagination, and CSV export for compliance reporting.

  • scan.created, scan.completed, scan.failed
  • api_key.created, api_key.revoked
  • vulnerability.resolved, vulnerability.ignored
  • member.invited, member.removed, member.role_changed
  • integration.created, integration.updated, integration.deleted
  • webhook.created, webhook.deleted
  • sarif.downloaded
  • billing.subscription_created, billing.subscription_cancelled

Audit logs are available at Dashboard > Audit Logs. Export to CSV for SOC 2 and compliance reporting.

Compatibility & Requirements

IntelStrike is designed to work with any LLM endpoint that accepts HTTP requests. Below are the supported runtimes, providers, and system requirements.

Supported Runtimes

RuntimeMinimum Version
Node.js18.0+
Python3.9+
Go1.21+

Supported LLM Providers

  • OpenAI (GPT-4, GPT-4o, GPT-3.5 Turbo)
  • Anthropic (Claude 4.5, Claude 4, Claude 3.5)
  • Azure OpenAI Service
  • Google Vertex AI (Gemini)
  • Cohere (Command R+)
  • AWS Bedrock
  • Hugging Face Inference Endpoints
  • Self-hosted models (vLLM, TGI, Ollama, LMStudio)
  • Any HTTP endpoint that accepts chat/completion requests

Supported Frameworks

  • LangChain / LangGraph
  • LlamaIndex
  • CrewAI
  • AutoGen
  • Semantic Kernel
  • Custom agent frameworks (via HTTP endpoint scanning)

System Requirements

RequirementDetails
OSmacOS, Linux, Windows (WSL2 recommended)
NetworkOutbound HTTPS access to api.intel-strike.com
BrowserChrome, Firefox, Safari, Edge (latest)

Versioning & Changelog

IntelStrike follows semantic versioning (semver). The API version is specified in the URL path (/v1).

Current Versions

ComponentVersionRelease Date
APIv1.6.02026-03-30
Dashboard1.6.02026-03-30

Recent Changes

v1.6.0 — March 2026

  • Supply Chain Security — NEW: Package integrity checking, IOC detection, and lockfile vulnerability scanning
  • Dashboard Supply Chain page — Upload and scan requirements.txt, package-lock.json, and Gemfile for vulnerabilities
  • API /package-check endpoint — Programmatic dependency security scanning
  • Agent Trust Chain Security — NEW: Detect identity spoofing, inter-agent injection, delegation abuse, and trust chain exploitation
  • Coverage for TeamPCP, LiteLLM, and Telnyx supply chain attacks
  • Added SUPPLY01-05 and A2A-TRUST vulnerability categories

v1.5.0 — March 2026

  • Autonomous Red Teaming Engine — multi-turn AI-powered adaptive attacks with budget management
  • Parallel probe execution (5x faster scans with configurable concurrency)
  • Stripe billing integration (Free, Pro $49/endpoint/mo, Enterprise)
  • Real-time dashboard with KPIs wired to live data
  • API key management with SHA-256 hashing and usage tracking
  • Autonomous mode with configurable max turns and token budget

v1.4.0 — March 2026

  • Added agent abuse scan profiles (LLM07, LLM08)
  • Improved prompt injection detection with multi-turn context analysis

v1.3.0 — February 2026

  • RAG-specific scan profile with retrieval poisoning detection
  • Webhook signature verification with HMAC-SHA256
  • Performance improvements: 40% faster scans with parallel probing

v1.2.0 — January 2026

  • HTML and PDF report generation from the dashboard
  • PagerDuty native integration
  • Custom scan profiles support
  • API rate limiting improvements

Breaking changes are introduced only in major versions. When upgrading between major versions, check the migration guide in the changelog.

Vulnerability Categories

IntelStrike covers 27 vulnerability categories across three domains: AI/LLM (18 categories), Web/API (10 categories), and Supply Chain (5 categories). Each category maps to one or more OWASP classifications.

AI / LLM Categories

IDNameProbesDescription
LLM01Prompt Injection25Direct & indirect injection via user input, documents, and RAG context
LLM02Insecure Output Handling15Unescaped model output rendered in downstream systems or UIs
LLM03Training Data Poisoning10Adversarial data in fine-tuning or RAG corpora affecting model behavior
LLM04Model Denial of Service10Resource exhaustion via recursive prompting or unbounded token consumption
LLM05Supply Chain Vulnerabilities8Compromised model weights, plugins, or third-party LLM integrations
LLM06Sensitive Data Disclosure15PII, secrets, or system context leaked through completions
LLM07Insecure Plugin Design10Over-permissive function calling, tool misuse, and missing auth checks
LLM08Excessive Agency10Agent autonomy beyond intended scope — unconstrained tool or API access
LLM09Overreliance5Business processes dependent on unverified model output without human oversight
LLM10Model Theft5Systematic querying to replicate proprietary model behavior
RAGRAG-Specific Attacks15Retrieval poisoning, context manipulation, and indirect injection via RAG sources
AGENTAgent Hijacking15Manipulation of autonomous AI agents through adversarial instructions
A2AAgent-to-Agent Attacks8Inter-agent identity spoofing, prompt injection, delegation abuse, trust chain exploitation
GUARDGuardrail Stress Testing10CTF pretexting, content filter bypass, instruction hierarchy escape, language-switch attacks
OSMODELOpen-Source Model Security5No safety layer, quantization degradation, fine-tuning poisoning, unrestricted output
CODEAGENTCoding Agent Attack Surface5Malicious dependencies, backdoor code generation, secret leakage in AI-suggested code
SOCIALSocial Engineering Content5AI-generated phishing, pretexting scenarios, authority impersonation, urgency manipulation

Web / API Categories

IDNameProbesDescription
WEB01SQL Injection5SQL injection including JSON field name injection and blind techniques
WEB02Cross-Site Scripting (XSS)4Reflected, event-handler, javascript: URL, and filter evasion XSS
WEB03Server-Side Request Forgery4AWS IMDSv1, GCP metadata, localhost/RFC-1918, URL encoding bypass
WEB04Auth Bypass / IDOR / JWT4IDOR, JWT none-algorithm, missing auth, API key disclosure
WEB05Command Injection / RCE5Unix/Windows shell metacharacters, blind timing-based detection
WEB06XML External Entity (XXE)4SSRF-via-XXE and blind out-of-band detection with auto XML Content-Type
WEB07Security Headers6CSP, HSTS, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, Permissions-Policy
WEB08Path Traversal5Unix/Windows, URL-encoded, and double-encoded directory traversal
WEB09CSRF4Missing token, invalid token, SameSite cookie checks
WEB10Open Redirect4External redirect, javascript: scheme, @ bypass, double-slash

Supply Chain Categories

IDNameProbesDescription
SUPPLY01Package Integrity Check5Detects known vulnerable and compromised package versions (LiteLLM, Telnyx, etc.)
SUPPLY02IOC Network Detection5Identifies connections to known malicious IPs and domains from active campaigns
SUPPLY03Dependency Lockfile Scanner5Scans lockfiles for vulnerable dependencies and unpinned packages
SUPPLY04.pth File Anomaly5Detects malicious Python path configuration files (LiteLLM attack vector)
SUPPLY05Registry Poisoning5Identifies typosquatting, dependency confusion, and namespace attacks
A2A-TRUSTAgent Trust Chain5Validates trust chain integrity between AI agents

Compliance Mapping

Every finding IntelStrike produces is automatically mapped to the relevant controls in SOC 2 Type II, PCI DSS v4.0, ISO 27001:2022, GDPR, NIST CSF 2.0, EU AI Act, and NIST AI RMF. Use the compliance report to generate audit evidence in one click.

Framework Coverage by Category

CategorySOC 2PCI DSS v4.0ISO 27001:2022GDPRNIST CSF 2.0
LLM01 — Prompt InjectionCC6.1, CC6.66.2.4A.8.28Art.25, Art.32DE.CM-8, PR.PS-1
LLM06 — Sensitive Data DisclosureCC6.1, CC6.73.4, 6.2.4A.8.10, A.8.11Art.5, Art.25, Art.32PR.DS-1, PR.DS-5
LLM08 — Excessive AgencyCC6.3, CC6.87.2.1A.5.15, A.8.2PR.AA-5, PR.AA-6
RAG — RAG AttacksCC6.1, CC6.73.4, 6.2.4A.8.10, A.8.28Art.25, Art.32PR.DS-1, DE.CM-8
AGENT — Agent HijackingCC6.3, CC6.86.2.4, 7.2.1A.5.15, A.8.2, A.8.28PR.AA-5, PR.AA-6, DE.CM-8
A2A — Agent-to-AgentCC6.1, CC6.2, CC6.66.2.4, 7.2.1A.5.14, A.5.15, A.8.28Art.25, Art.32PR.AC-1, PR.DS-1, DE.CM-8
WEB01 — SQL InjectionCC6.1, CC7.16.2.4, 6.3.1A.8.28, A.8.29Art.32PR.DS-2, DE.CM-4
WEB02 — XSSCC6.1, CC6.66.2.4A.8.28PR.PS-1, DE.CM-8
WEB03 — SSRFCC6.6, CC6.71.3.2, 6.2.4A.8.20, A.8.22PR.IR-1, DE.CM-1
WEB04 — Auth BypassCC6.2, CC6.38.2.1, 8.3.1, 8.6.1A.5.15, A.5.16, A.9.4Art.32PR.AA-1, PR.AA-2
WEB05 — Command InjectionCC6.1, CC7.16.2.4, 6.3.1A.8.28DE.CM-4, PR.DS-2
WEB06 — XXECC6.16.2.4A.8.28PR.PS-1
WEB07 — Security HeadersCC6.66.2.3, 6.2.4A.8.22, A.8.23PR.PS-1, PR.PS-2
WEB08 — Path TraversalCC6.1, CC6.73.4, 6.2.4A.8.3, A.8.28Art.25, Art.32PR.DS-1, PR.AC-4
GUARD — Guardrail BypassCC6.1, CC6.6, CC6.86.2.4A.8.28, A.5.14Art.25, Art.32PR.DS-1, DE.CM-8
OSMODEL — Open-Source ModelCC6.1, CC6.6, CC7.16.2.4A.8.28, A.5.14, A.5.19Art.25, Art.32PR.DS-1, DE.CM-8
CODEAGENT — Coding AgentCC6.1, CC6.6, CC7.1, CC9.26.3.1, 6.4.1A.8.28, A.5.19, A.5.20Art.25, Art.28PR.DS-1, DE.CM-8, ID.SC-2
SOCIAL — Social EngineeringCC6.1, CC6.6, CC6.86.2.4A.8.28, A.5.14, A.5.17Art.25, Art.32PR.DS-1, DE.CM-8

Export a compliance evidence bundle from the dashboard: Dashboard → Scans → [scan] → Compliance Report. The bundle includes findings mapped to controls, evidence logs, and a summary suitable for auditor review.

Error Codes

The IntelStrike API uses standard HTTP status codes. All error responses include a JSON body with a code string and a human-readable message.

Error response format

json
{
"error": {
"code": "SCAN_LIMIT_EXCEEDED",
"message": "Free plan allows 5 scans per month. Upgrade to Pro for unlimited scans.",
"status": 429
}
}
HTTP StatusCode StringDescription
400INVALID_REQUESTMissing required fields or invalid parameter values
400INVALID_ENDPOINTThe target endpoint URL is malformed or not reachable
400INVALID_PROFILEUnknown scan profile name
401UNAUTHORIZEDMissing or invalid API key
401API_KEY_REVOKEDThe API key has been revoked
403FORBIDDENAuthenticated but insufficient role/plan for this action
404SCAN_NOT_FOUNDScan ID does not exist in your organization
404FINDING_NOT_FOUNDFinding ID does not exist
409SCAN_ALREADY_RUNNINGA scan is already running for this endpoint
422TARGET_UNREACHABLEIntelStrike could not connect to the target endpoint
429RATE_LIMIT_EXCEEDEDToo many API requests — check Retry-After header
429SCAN_LIMIT_EXCEEDEDMonthly scan limit reached for your plan
500INTERNAL_ERRORUnexpected server error — contact support if it persists
503SERVICE_UNAVAILABLEIntelStrike is temporarily unavailable

FAQ & Troubleshooting

Frequently Asked Questions

Does IntelStrike send real attacks to my endpoint?

IntelStrike sends adversarial probes designed to test your endpoint's defenses. These are non-destructive — they do not modify data, trigger side effects, or cause damage. However, they may generate unusual log entries. We recommend running initial scans in a staging environment.

Can I scan endpoints behind a VPN or firewall?

Yes. Use the --proxy flag to route scans through your corporate proxy, or whitelist IntelStrike's IP ranges in your firewall. Contact support for the current IP list.

How long does a scan take?

With parallel probe execution (default concurrency of 5), a full OWASP LLM Top 10 scan typically takes 1-2 minutes. The 'quick' profile runs in under 30 seconds. Autonomous red teaming scans take 5-15 minutes depending on the number of turns and budget.

Can I scan multiple endpoints?

Yes. Register multiple targets in the dashboard, or use the REST API to trigger scans for multiple endpoints programmatically.

Troubleshooting

Scan times out

  • Try a lighter scan profile (e.g., 'quick' instead of 'full-spectrum')
  • Ensure the target endpoint is reachable and responding within expected latency
  • Check if a firewall or WAF is blocking IntelStrike probes

Authentication errors (401/403)

  • Verify your API key is set correctly: echo $INTELSTRIKE_API_KEY
  • Ensure the key has not been revoked in Dashboard → API Keys
  • Check that you're using the correct key type (live vs. test)

No findings detected

  • This may indicate strong defenses — review the scan report for details
  • Try a more targeted profile (e.g., prompt-injection) for deeper testing
  • Ensure the endpoint is returning actual LLM responses (not cached or static)
  • Increase concurrency for more comprehensive probing

Need help? Reach out at [email protected] or join our Discord community for real-time assistance.