Skip to content

docs: optimize red teaming docs for MCP and humans#281

Merged
Aryansharma28 merged 3 commits intomainfrom
docs/red-teaming
Mar 13, 2026
Merged

docs: optimize red teaming docs for MCP and humans#281
Aryansharma28 merged 3 commits intomainfrom
docs/red-teaming

Conversation

@Aryansharma28
Copy link
Copy Markdown
Contributor

@Aryansharma28 Aryansharma28 commented Mar 10, 2026

Summary

  • Use attacker.marathon_script() instance method (auto early exit + backtrack padding) instead of standalone
  • Add Check functions section with full ScenarioState/ScenarioExecutionStateLike method reference
  • Add Exports section with exact Python/TypeScript imports
  • Remove closed #2144 from roadmap
  • Tighter prose: less narrative, more structured reference
  • Every code example verified against source signatures
  • All param names match implementation (fast_refusal_detection, detectRefusals, etc.)

Follow-up to #276.
Part of langwatch/langwatch#1713

Test plan

  • cd docs && pnpm dev builds without errors
  • All code examples match actual API signatures

🤖 Generated with Claude Code

@github-actions github-actions Bot added low-risk-change PR qualifies as low-risk per policy and can be merged without manual review and removed low-risk-change PR qualifies as low-risk per policy and can be merged without manual review labels Mar 10, 2026
This was referenced Mar 13, 2026
Aryansharma28 and others added 3 commits March 13, 2026 14:08
- Use attacker.marathon_script() instance method (handles early exit + backtrack padding) instead of standalone
- Add "Check functions" section with full ScenarioState/ScenarioExecutionStateLike method reference
- Add "Exports" section with exact Python/TypeScript imports
- Remove closed #2144 from roadmap
- Tighten prose: less narrative, more structured reference
- Every code example is copy-pasteable with correct signatures
- All param names verified against source (fast_refusal_detection, detectRefusals, etc.)

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
metapromptTemplate is only on RedTeamAgentConfig, not CrescendoConfig.
Users need redTeamAgent() (not redTeamCrescendo()) to customize it in TS.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
…ripe-style tone

- All code examples use 30 turns (minimum for meaningful results)
- Nightly CI examples use 50 turns (recommended for thorough coverage)
- Rewritten in direct, code-first style matching Stripe/OpenAI docs
- Clear recommendation callout: 50 turns for thorough, 30 minimum
- Structured for MCP consumption: step-by-step, scannable headings

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
@github-actions github-actions Bot added low-risk-change PR qualifies as low-risk per policy and can be merged without manual review and removed low-risk-change PR qualifies as low-risk per policy and can be merged without manual review labels Mar 13, 2026
@github-actions
Copy link
Copy Markdown
Contributor

Automated low-risk assessment

This PR was evaluated against the repository's Low-Risk Pull Requests procedure.

  • Scope: Modify red-teaming documentation: restructure and tighten prose; add "Check functions" and "Exports" sections; change example usage to use attacker.marathon_script() and updated parameter names/values; remove roadmap item #2144; adjust example turn counts and CI guidance.
  • Exclusions confirmed: no changes to auth, security settings, database schema, business-critical logic, or external integrations.
  • Classification: low-risk-change under the documented policy.

The PR only edits a documentation file (docs/pages/advanced/red-teaming.mdx), updating prose and example snippets without changing source code, configuration, secrets, database schemas, auth, or external integrations. All changes are documentation-level (example code in docs, explanatory text, roadmap items), which fits the allowed low-risk categories.

This classification allows merging without manual review once all required CI checks are passing and branch protection rules are satisfied.

@Aryansharma28 Aryansharma28 merged commit 28d084c into main Mar 13, 2026
7 checks passed
@Aryansharma28 Aryansharma28 deleted the docs/red-teaming branch March 13, 2026 13:13
sergioestebance added a commit that referenced this pull request May 1, 2026
…CVEs

Override transitive dependencies to patched versions:
- picomatch >=2.3.2 / >=4.0.4 (CVE-2026-33671, ReDoS via extglob)
- @hono/node-server >=1.19.10 (CVE-2026-29087, auth bypass via encoded slashes)
- glob >=10.5.0 (CVE-2025-64756, CLI command injection via shell:true)

Resolves dependabot alerts #281, #198, #67.
sergioestebance added a commit that referenced this pull request May 1, 2026
…CVEs

Override transitive dependencies to patched versions:
- picomatch >=2.3.2 / >=4.0.4 (CVE-2026-33671, ReDoS via extglob)
- @hono/node-server >=1.19.10 (CVE-2026-29087, auth bypass via encoded slashes)
- glob >=10.5.0 (CVE-2025-64756, CLI command injection via shell:true)

Resolves dependabot alerts #281, #198, #67.
sergioestebance added a commit that referenced this pull request May 2, 2026
…CVEs

Override transitive dependencies to patched versions:
- picomatch >=2.3.2 / >=4.0.4 (CVE-2026-33671, ReDoS via extglob)
- @hono/node-server >=1.19.10 (CVE-2026-29087, auth bypass via encoded slashes)
- glob >=10.5.0 (CVE-2025-64756, CLI command injection via shell:true)

Resolves dependabot alerts #281, #198, #67.
Aryansharma28 pushed a commit that referenced this pull request May 4, 2026
…CVEs

Override transitive dependencies to patched versions:
- picomatch >=2.3.2 / >=4.0.4 (CVE-2026-33671, ReDoS via extglob)
- @hono/node-server >=1.19.10 (CVE-2026-29087, auth bypass via encoded slashes)
- glob >=10.5.0 (CVE-2025-64756, CLI command injection via shell:true)

Resolves dependabot alerts #281, #198, #67.
Aryansharma28 pushed a commit that referenced this pull request May 4, 2026
…CVEs

Override transitive dependencies to patched versions:
- picomatch >=2.3.2 / >=4.0.4 (CVE-2026-33671, ReDoS via extglob)
- @hono/node-server >=1.19.10 (CVE-2026-29087, auth bypass via encoded slashes)
- glob >=10.5.0 (CVE-2025-64756, CLI command injection via shell:true)

Resolves dependabot alerts #281, #198, #67.
Aryansharma28 pushed a commit that referenced this pull request May 4, 2026
…CVEs

Override transitive dependencies to patched versions:
- picomatch >=2.3.2 / >=4.0.4 (CVE-2026-33671, ReDoS via extglob)
- @hono/node-server >=1.19.10 (CVE-2026-29087, auth bypass via encoded slashes)
- glob >=10.5.0 (CVE-2025-64756, CLI command injection via shell:true)

Resolves dependabot alerts #281, #198, #67.
Aryansharma28 added a commit that referenced this pull request May 4, 2026
…CVEs (#394)

Override transitive dependencies to patched versions:
- picomatch >=2.3.2 / >=4.0.4 (CVE-2026-33671, ReDoS via extglob)
- @hono/node-server >=1.19.10 (CVE-2026-29087, auth bypass via encoded slashes)
- glob >=10.5.0 (CVE-2025-64756, CLI command injection via shell:true)

Resolves dependabot alerts #281, #198, #67.

Co-authored-by: Aryan Sharma <aryan@langwatch.ai>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

low-risk-change PR qualifies as low-risk per policy and can be merged without manual review

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant