Crawler Summary

intelstrike answer-first brief

AI-powered pipeline that transforms Cyber Threat Intelligence into actionable pentesting test cases using CrewAI and MITRE ATT&CK IntelStrike A multi-agent AI pipeline that operationalizes Cyber Threat Intelligence (CTI) for penetration testing engagements. Built with CrewAI, Claude, and Tavily. --- How It Works Three agents run sequentially, each passing context to the next: Output A Markdown report containing: - **Executive Summary** - threat context for the engagement - **Threat Actor Profiles** - relevant groups and their targeting patterns Capability contract not published. No trust telemetry is available yet. 7 GitHub stars reported by the source. Last updated 4/15/2026.

Freshness

Last checked 4/15/2026

Best For

intelstrike is best for crewai, multi-agent workflows where OpenClaw compatibility matters.

Not Ideal For

Contract metadata is missing or unavailable for deterministic execution.

Evidence Sources Checked

editorial-content, GITHUB REPOS, runtime-metrics, public facts pack

Claim this agent
Agent DossierGITHUB REPOSSafety: 66/100

intelstrike

AI-powered pipeline that transforms Cyber Threat Intelligence into actionable pentesting test cases using CrewAI and MITRE ATT&CK IntelStrike A multi-agent AI pipeline that operationalizes Cyber Threat Intelligence (CTI) for penetration testing engagements. Built with CrewAI, Claude, and Tavily. --- How It Works Three agents run sequentially, each passing context to the next: Output A Markdown report containing: - **Executive Summary** - threat context for the engagement - **Threat Actor Profiles** - relevant groups and their targeting patterns

OpenClawself-declared

Public facts

5

Change events

1

Artifacts

0

Freshness

Apr 15, 2026

Verifiededitorial-contentNo verified compatibility signals7 GitHub stars

Capability contract not published. No trust telemetry is available yet. 7 GitHub stars reported by the source. Last updated 4/15/2026.

7 GitHub starsTrust evidence available

Trust score

Unknown

Compatibility

OpenClaw

Freshness

Apr 15, 2026

Vendor

Yoelapu

Artifacts

0

Benchmarks

0

Last release

Unpublished

Executive Summary

Key links, install path, and a quick operational read before the deeper crawl record.

Verifiededitorial-content

Summary

Capability contract not published. No trust telemetry is available yet. 7 GitHub stars reported by the source. Last updated 4/15/2026.

Setup snapshot

  1. 1

    Setup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.

  2. 2

    Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.

Evidence Ledger

Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.

Verifiededitorial-content
Vendor (1)

Vendor

Yoelapu

profilemedium
Observed Apr 15, 2026Source linkProvenance
Compatibility (1)

Protocol compatibility

OpenClaw

contractmedium
Observed Apr 15, 2026Source linkProvenance
Adoption (1)

Adoption signal

7 GitHub stars

profilemedium
Observed Apr 15, 2026Source linkProvenance
Security (1)

Handshake status

UNKNOWN

trustmedium
Observed unknownSource linkProvenance
Integration (1)

Crawlable docs

6 indexed pages on the official domain

search_documentmedium
Observed Apr 15, 2026Source linkProvenance

Release & Crawl Timeline

Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.

Self-declaredagent-index

Artifacts Archive

Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.

Self-declaredGITHUB REPOS

Extracted files

0

Examples

6

Snippets

0

Languages

python

Executable Examples

text

[config.py]
    │
    ▼
Agent 1: Threat Profiler
    Identifies 2-3 threat groups relevant to the client's
    industry, geography, and tech stack
    │
    ▼
Agent 2: TTP Extractor
    Extracts and filters TTPs applicable to the known stack,
    mapped to MITRE ATT&CK, prioritized by exploitation frequency
    │
    ▼
Agent 3: Test Case Builder
    Translates TTPs into an actionable checklist with steps,
    tools, payloads, success criteria, and quick wins
    │
    ▼
[intelstrike_report.md]

text

intelstrike/
├── .gitignore         # protects secrets and outputs from version control
├── README.md
├── requirements.txt   # dependencies
├── config.py          # only file you edit per engagement
├── agents.py          # agent definitions
├── tasks.py           # task definitions
└── main.py            # entry point

bash

python3 --version  # verify your version

bash

python3 -m venv venv
source venv/bin/activate      # Mac / Linux
venv\Scripts\activate         # Windows

bash

./venv/bin/pip3 install -r requirements.txt

bash

# Tavily (required for web search)
export TAVILY_API_KEY="your-key"      # https://tavily.com (free tier: 1,000 calls/month)

# Choose ONE LLM provider:
export ANTHROPIC_API_KEY="your-key"   # https://console.anthropic.com
export OPENAI_API_KEY="your-key"      # https://platform.openai.com
export GOOGLE_API_KEY="your-key"      # https://aistudio.google.com
export GROQ_API_KEY="your-key"        # https://console.groq.com (free tier available)
# Ollama: no key needed, just run: ollama pull llama3.2

Docs & README

Full documentation captured from public sources, including the complete README when available.

Self-declaredGITHUB REPOS

Docs source

GITHUB REPOS

Editorial quality

ready

AI-powered pipeline that transforms Cyber Threat Intelligence into actionable pentesting test cases using CrewAI and MITRE ATT&CK IntelStrike A multi-agent AI pipeline that operationalizes Cyber Threat Intelligence (CTI) for penetration testing engagements. Built with CrewAI, Claude, and Tavily. --- How It Works Three agents run sequentially, each passing context to the next: Output A Markdown report containing: - **Executive Summary** - threat context for the engagement - **Threat Actor Profiles** - relevant groups and their targeting patterns

Full README

IntelStrike

A multi-agent AI pipeline that operationalizes Cyber Threat Intelligence (CTI) for penetration testing engagements. Built with CrewAI, Claude, and Tavily.


How It Works

Three agents run sequentially, each passing context to the next:

[config.py]
    │
    ▼
Agent 1: Threat Profiler
    Identifies 2-3 threat groups relevant to the client's
    industry, geography, and tech stack
    │
    ▼
Agent 2: TTP Extractor
    Extracts and filters TTPs applicable to the known stack,
    mapped to MITRE ATT&CK, prioritized by exploitation frequency
    │
    ▼
Agent 3: Test Case Builder
    Translates TTPs into an actionable checklist with steps,
    tools, payloads, success criteria, and quick wins
    │
    ▼
[intelstrike_report.md]

Output

A Markdown report containing:

  • Executive Summary - threat context for the engagement
  • Threat Actor Profiles - relevant groups and their targeting patterns
  • Prioritized TTP Table - filtered by stack, scored by priority
  • Actionable Test Cases - checkbox format with steps, tools, and criteria
  • Top 5 Quick Wins - highest impact / lowest effort to tackle first
  • Threat Narrative - attack chain story to contextualize findings in reports

Project Structure

intelstrike/
├── .gitignore         # protects secrets and outputs from version control
├── README.md
├── requirements.txt   # dependencies
├── config.py          # only file you edit per engagement
├── agents.py          # agent definitions
├── tasks.py           # task definitions
└── main.py            # entry point

config.py Centralized configuration for the pipeline. Contains the engagement profile (industry, geography, tech stack, scope, duration), LLM provider and model selection, output file path, and search settings. This is the only file you need to edit before running a new engagement.

agents.py Defines the three AI agents used in the pipeline. Each agent has a specific role, goal, and backstory that shapes how it approaches its task. Also contains the _build_llm() function that dynamically constructs the LLM object based on the provider configured in config.py.

| Agent | Role | Responsibility | |---|---|---| | threat_profiler | Threat Intelligence Analyst | Researches and identifies relevant threat actor groups for the client profile | | ttp_extractor | Offensive Security TTP Specialist | Extracts and filters TTPs from identified groups, mapped to MITRE ATT&CK | | test_case_builder | Penetration Testing Lead | Translates TTPs into an actionable pentest checklist |

tasks.py Defines the three tasks executed by the pipeline, built dynamically using the engagement context from config.py. Each task specifies what the agent must do, what output is expected, and which previous task results it has access to via CrewAI's context mechanism.

main.py Entry point for the pipeline. Imports configuration, initializes the agents and tasks, assembles the CrewAI crew, and runs the pipeline. Also handles the console output that shows the engagement profile before execution starts.


Setup

Requirements

Python 3.10 or higher is required. CrewAI supports 3.10-3.12.

python3 --version  # verify your version

1. Create a virtual environment

A virtual environment is recommended on all platforms. It isolates project dependencies and avoids conflicts with system packages.

python3 -m venv venv
source venv/bin/activate      # Mac / Linux
venv\Scripts\activate         # Windows

You should see (venv) at the start of your terminal prompt confirming the environment is active.

2. Install dependencies

./venv/bin/pip3 install -r requirements.txt

3. Set environment variables

Set the API key for your chosen LLM provider and Tavily:

# Tavily (required for web search)
export TAVILY_API_KEY="your-key"      # https://tavily.com (free tier: 1,000 calls/month)

# Choose ONE LLM provider:
export ANTHROPIC_API_KEY="your-key"   # https://console.anthropic.com
export OPENAI_API_KEY="your-key"      # https://platform.openai.com
export GOOGLE_API_KEY="your-key"      # https://aistudio.google.com
export GROQ_API_KEY="your-key"        # https://console.groq.com (free tier available)
# Ollama: no key needed, just run: ollama pull llama3.2

4. Configure the engagement

Edit config.py with the client's details and your preferred LLM:

# LLM provider - pick one
LLM_PROVIDER = "anthropic"          # anthropic / openai / google / groq / ollama / azure / bedrock
LLM_MODEL    = "claude-sonnet-4-5"  # model name for the selected provider

ENGAGEMENT = {
    "client_industry":  "Financial Services",
    "client_geography": "Latin America",
    "tech_stack":       ["WordPress", "AWS", "MySQL"],
    "scope_type":       "web application",
    "scope_focus":      "initial access, authentication bypass, data exfiltration",
    "engagement_days":  10,
}

Provider and model examples:

| Provider | LLM_PROVIDER | LLM_MODEL | |---|---|---| | Anthropic | "anthropic" | "claude-sonnet-4-5" | | OpenAI | "openai" | "gpt-4o" | | Google Gemini | "google" | "gemini/gemini-1.5-pro" | | Groq | "groq" | "groq/llama-3.1-70b-versatile" | | Ollama (local) | "ollama" | "ollama/llama3.2" |

5. Run the pipeline

python main.py

Validate config and API keys without running:

python main.py --dry-run

The report is saved to intelstrike_report.md by default. The output path can be changed in config.py.


Configuration Reference

All settings live in config.py:

| Setting | Description | Default | |---|---|---| | ENGAGEMENT["client_industry"] | Client's industry vertical | "Financial Services" | | ENGAGEMENT["client_geography"] | Client's operating geography | "Latin America" | | ENGAGEMENT["tech_stack"] | Known technologies in scope | ["WordPress", "AWS", "MySQL"] | | ENGAGEMENT["scope_type"] | Type of engagement | "web application" | | ENGAGEMENT["scope_focus"] | Key objectives to prioritize within the scope | "initial access, authentication bypass, data exfiltration" | | ENGAGEMENT["engagement_days"] | Engagement duration in days | 10 | | OUTPUT_FILE | Output report filename | "intelstrike_report.md" | | LLM_PROVIDER | LLM provider to use | "anthropic" | | LLM_MODEL | Model name for the selected provider | "claude-sonnet-4-5" | | LLM_MAX_ITER | Max agent iterations | 3 | | VERBOSE | Console output verbosity | True | | SEARCH_MAX_RESULTS | Tavily results per query | 3 |


Adapting to Different Engagement Types

The pipeline is not limited to web application testing. It works for any engagement type - the agents adapt their research and TTP selection based on scope_type, scope_focus, and tech_stack.

Web Application

ENGAGEMENT = {
    "client_industry":  "Financial Services",
    "client_geography": "Latin America",
    "tech_stack":       ["WordPress", "AWS", "MySQL"],
    "scope_type":       "web application",
    "scope_focus":      "initial access, authentication bypass, data exfiltration",
    "engagement_days":  10,
}

Active Directory / Internal Network

ENGAGEMENT = {
    "client_industry":  "Government",
    "client_geography": "United States",
    "tech_stack":       ["Active Directory", "Windows Server 2022", "Exchange"],
    "scope_type":       "internal network",
    "scope_focus":      "lateral movement, privilege escalation, domain compromise",
    "engagement_days":  14,
}

Infrastructure / Network

ENGAGEMENT = {
    "client_industry":  "Energy",
    "client_geography": "Europe",
    "tech_stack":       ["Cisco IOS", "Windows Server", "VMware"],
    "scope_type":       "infrastructure",
    "scope_focus":      "network access, credential harvesting, persistence",
    "engagement_days":  10,
}

Cloud

ENGAGEMENT = {
    "client_industry":  "Technology",
    "client_geography": "Asia Pacific",
    "tech_stack":       ["AWS", "S3", "EC2", "IAM", "Lambda"],
    "scope_type":       "cloud",
    "scope_focus":      "misconfiguration, IAM privilege escalation, data exfiltration",
    "engagement_days":  7,
}

License

MIT - use freely, attribution appreciated.

Contract & API

Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.

MissingGITHUB REPOS

Contract coverage

Status

missing

Auth

None

Streaming

No

Data region

Unspecified

Protocol support

OpenClaw: self-declared

Requires: none

Forbidden: none

Guardrails

Operational confidence: low

No positive guardrails captured.
Invocation examples
curl -s "https://xpersona.co/api/v1/agents/crewai-yoelapu-intelstrike/snapshot"
curl -s "https://xpersona.co/api/v1/agents/crewai-yoelapu-intelstrike/contract"
curl -s "https://xpersona.co/api/v1/agents/crewai-yoelapu-intelstrike/trust"

Reliability & Benchmarks

Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.

Missingruntime-metrics

Trust signals

Handshake

UNKNOWN

Confidence

unknown

Attempts 30d

unknown

Fallback rate

unknown

Runtime metrics

Observed P50

unknown

Observed P95

unknown

Rate limit

unknown

Estimated cost

unknown

Do not use if

Contract metadata is missing or unavailable for deterministic execution.
No benchmark suites or observed failure patterns are available.

Media & Demo

Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.

Missingno-media
No screenshots, media assets, or demo links are available.

Related Agents

Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.

Self-declaredprotocol-neighbors
GITHUB_REPOSactivepieces

Rank

70

AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents

Traction

No public download signal

Freshness

Updated 2d ago

OPENCLAW
GITHUB_REPOScherry-studio

Rank

70

AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs

Traction

No public download signal

Freshness

Updated 5d ago

MCPOPENCLAW
GITHUB_REPOSAionUi

Rank

70

Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | 🌟 Star if you like it!

Traction

No public download signal

Freshness

Updated 6d ago

MCPOPENCLAW
GITHUB_REPOSCopilotKit

Rank

70

The Frontend for Agents & Generative UI. React + Angular

Traction

No public download signal

Freshness

Updated 23d ago

OPENCLAW
Machine Appendix

Contract JSON

{
  "contractStatus": "missing",
  "authModes": [],
  "requires": [],
  "forbidden": [],
  "supportsMcp": false,
  "supportsA2a": false,
  "supportsStreaming": false,
  "inputSchemaRef": null,
  "outputSchemaRef": null,
  "dataRegion": null,
  "contractUpdatedAt": null,
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Invocation Guide

{
  "preferredApi": {
    "snapshotUrl": "https://xpersona.co/api/v1/agents/crewai-yoelapu-intelstrike/snapshot",
    "contractUrl": "https://xpersona.co/api/v1/agents/crewai-yoelapu-intelstrike/contract",
    "trustUrl": "https://xpersona.co/api/v1/agents/crewai-yoelapu-intelstrike/trust"
  },
  "curlExamples": [
    "curl -s \"https://xpersona.co/api/v1/agents/crewai-yoelapu-intelstrike/snapshot\"",
    "curl -s \"https://xpersona.co/api/v1/agents/crewai-yoelapu-intelstrike/contract\"",
    "curl -s \"https://xpersona.co/api/v1/agents/crewai-yoelapu-intelstrike/trust\""
  ],
  "jsonRequestTemplate": {
    "query": "summarize this repo",
    "constraints": {
      "maxLatencyMs": 2000,
      "protocolPreference": [
        "OPENCLEW"
      ]
    }
  },
  "jsonResponseTemplate": {
    "ok": true,
    "result": {
      "summary": "...",
      "confidence": 0.9
    },
    "meta": {
      "source": "GITHUB_REPOS",
      "generatedAt": "2026-04-16T23:38:01.110Z"
    }
  },
  "retryPolicy": {
    "maxAttempts": 3,
    "backoffMs": [
      500,
      1500,
      3500
    ],
    "retryableConditions": [
      "HTTP_429",
      "HTTP_503",
      "NETWORK_TIMEOUT"
    ]
  }
}

Trust JSON

{
  "status": "unavailable",
  "handshakeStatus": "UNKNOWN",
  "verificationFreshnessHours": null,
  "reputationScore": null,
  "p95LatencyMs": null,
  "successRate30d": null,
  "fallbackRate": null,
  "attempts30d": null,
  "trustUpdatedAt": null,
  "trustConfidence": "unknown",
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Capability Matrix

{
  "rows": [
    {
      "key": "OPENCLEW",
      "type": "protocol",
      "support": "unknown",
      "confidenceSource": "profile",
      "notes": "Listed on profile"
    },
    {
      "key": "crewai",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "multi-agent",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    }
  ],
  "flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:crewai|supported|profile capability:multi-agent|supported|profile"
}

Facts JSON

[
  {
    "factKey": "vendor",
    "category": "vendor",
    "label": "Vendor",
    "value": "Yoelapu",
    "href": "https://github.com/yoelapu/intelstrike",
    "sourceUrl": "https://github.com/yoelapu/intelstrike",
    "sourceType": "profile",
    "confidence": "medium",
    "observedAt": "2026-04-15T06:04:19.618Z",
    "isPublic": true
  },
  {
    "factKey": "protocols",
    "category": "compatibility",
    "label": "Protocol compatibility",
    "value": "OpenClaw",
    "href": "https://xpersona.co/api/v1/agents/crewai-yoelapu-intelstrike/contract",
    "sourceUrl": "https://xpersona.co/api/v1/agents/crewai-yoelapu-intelstrike/contract",
    "sourceType": "contract",
    "confidence": "medium",
    "observedAt": "2026-04-15T06:04:19.618Z",
    "isPublic": true
  },
  {
    "factKey": "traction",
    "category": "adoption",
    "label": "Adoption signal",
    "value": "7 GitHub stars",
    "href": "https://github.com/yoelapu/intelstrike",
    "sourceUrl": "https://github.com/yoelapu/intelstrike",
    "sourceType": "profile",
    "confidence": "medium",
    "observedAt": "2026-04-15T06:04:19.618Z",
    "isPublic": true
  },
  {
    "factKey": "docs_crawl",
    "category": "integration",
    "label": "Crawlable docs",
    "value": "6 indexed pages on the official domain",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  },
  {
    "factKey": "handshake_status",
    "category": "security",
    "label": "Handshake status",
    "value": "UNKNOWN",
    "href": "https://xpersona.co/api/v1/agents/crewai-yoelapu-intelstrike/trust",
    "sourceUrl": "https://xpersona.co/api/v1/agents/crewai-yoelapu-intelstrike/trust",
    "sourceType": "trust",
    "confidence": "medium",
    "observedAt": null,
    "isPublic": true
  }
]

Change Events JSON

[
  {
    "eventType": "docs_update",
    "title": "Docs refreshed: Sign in to GitHub · GitHub",
    "description": "Fresh crawlable documentation was indexed for the official domain.",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  }
]

Sponsored

Ads related to intelstrike and adjacent AI workflows.