Implement the attack catalogue loop (step 5a) in red-team.sh that was previously a forward spec in the formula. The loop replays every *.jsonl attack file through AttackRunner.s.sol with snapshot revert between files, records LM total ETH before/after each attack, and injects results into the adversarial agent prompt so it knows which strategies are already catalogued. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> |
||
|---|---|---|
| .. | ||
| helpers | ||
| scenarios/passive-confidence | ||
| bootstrap-light.sh | ||
| evaluate.sh | ||
| export-attacks.py | ||
| holdout.config.ts | ||
| promote-attacks.sh | ||
| red-team-program.md | ||
| red-team-sweep.sh | ||
| red-team.sh | ||
| run-protocol.sh | ||
| run-resources.sh | ||