Skip to content

Commit fa1f56e

Browse files
Merge pull request #169 from dreadnode/ads/eng-3007-fix-incorrect-hyperlinks-in-agent-examples-documentation
docs: fix hyperlink redirect for example agents
2 parents 4db4ce1 + bb0287b commit fa1f56e

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

docs/examples/overview.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -32,31 +32,31 @@ Below are brief descriptions of each agent with a link to their detailed README
3232

3333
This agent automatically builds and runs Capture The Flag (CTF) challenges. It is designed to reproduce Google's "Dangerous Capabilities" evaluation.
3434

35-
> **[More Details](/examples/dangerous-capabilities)**
35+
> **[More Details](/strikes/examples/dangerous-capabilities)**
3636

3737
### 2. Dotnet Reversing Agent
3838

3939
This agent is designed to perform reverse engineering of .NET binaries. It can decompile .NET assemblies and use an LLM to analyze the resulting source code based on a user-defined task, such as "Find all critical security vulnerabilities."
4040

41-
> **[More Details](/examples/dotnet-reversing)**
41+
> **[More Details](/strikes/examples/dotnet-reversing)**
4242

4343
### 3. Python Agent
4444

4545
A general-purpose agent that provides a sandboxed Jupyter environment inside a Docker container. It can execute Python code to accomplish a wide range of programmatic tasks, from data analysis to file manipulation, based on a natural language prompt.
4646

47-
> **[More Details](/examples/python-agent)**
47+
> **[More Details](/strikes/examples/python-agent)**
4848

4949
### 4. Sast Scanning Agent
5050

5151
This agent is a specialized framework for evaluating the security analysis capabilities of LLMs. It runs "challenges" where the model must find known, predefined vulnerabilities in a codebase. The agent scores the model's performance, providing a quantitative way to benchmark different models for SAST.
5252

53-
> **[More Details](/examples/sast-scanning)**
53+
> **[More Details](/strikes/examples/sast-scanning)**
5454

5555
### 5. Sensitive Data Extraction Agent
5656

5757
An autonomous agent that explores and analyzes file systems to find and report sensitive data like credentials, API keys, and personal information. Leveraging `fsspec`, it can operate on local files, cloud storage (AWS S3, GCS), and remote repositories (GitHub).
5858

59-
> **[More Details](/examples/sensitive-data)**
59+
> **[More Details](/strikes/examples/sensitive-data)**
6060

6161
## General Usage
6262

0 commit comments

Comments
 (0)