Implement the attack catalogue loop (step 5a) in red-team.sh that was previously a forward spec in the formula. The loop replays every *.jsonl attack file through AttackRunner.s.sol with snapshot revert between files, records LM total ETH before/after each attack, and injects results into the adversarial agent prompt so it knows which strategies are already catalogued. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> |
||
|---|---|---|
| .. | ||
| harb-evaluator | ||
| bootstrap-common.sh | ||
| build-ci-images.sh | ||
| build-kraiken-lib.sh | ||
| ci-bootstrap.sh | ||
| dev.sh | ||
| quick-screenshot.mjs | ||
| recover-bootstrap.sh | ||
| review-poll.sh | ||
| review-pr.sh | ||
| run-usertest.sh | ||
| screenshot-stake-page.mjs | ||
| sync-tax-rates.mjs | ||
| wait-for-service.sh | ||
| watch-kraiken-lib.sh | ||