Skip to content

Commit 8b930c6

Browse files
Switch to custom domain agents.siddhantkhare.com
- Update site URL and remove /agentic-engineering-guide base path - Add CNAME file for GitHub Pages - Fix font paths and image paths to use root-relative URLs Co-authored-by: Ona <no-reply@ona.com>
1 parent b747a80 commit 8b930c6

10 files changed

Lines changed: 13 additions & 12 deletions

astro.config.mjs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ import sitemap from "@astrojs/sitemap";
44
import tailwindcss from "@tailwindcss/vite";
55

66
export default defineConfig({
7-
site: "https://siddhant-k-code.github.io",
8-
base: "/agentic-engineering-guide",
7+
site: "https://agents.siddhantkhare.com",
8+
base: "/",
99
integrations: [mdx(), sitemap()],
1010
vite: {
1111
plugins: [tailwindcss()],

public/CNAME

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
agents.siddhantkhare.com

src/content/chapters/05-context-engineering-stack.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ implement retrieval (getting chunks from a vector database) and skip the
1717
post-retrieval processing that determines whether those chunks actually
1818
help the model.
1919

20-
![](/agentic-engineering-guide/images/fig-context-stack.png)
20+
![](/images/fig-context-stack.png)
2121

2222
## Layer 1: Clustering
2323
When you retrieve 10 chunks from a vector database, they often contain

src/content/chapters/07-agent-security-crisis.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ the way you validate structured API inputs.
6565
The agent threat model has three primary attack vectors. Understanding
6666
them is essential because they require fundamentally different defenses.
6767

68-
![](/agentic-engineering-guide/images/fig-threat-model-sketch.png)
68+
![](/images/fig-threat-model-sketch.png)
6969

7070
### Vector 1: Prompt injection
7171
Prompt injection occurs when malicious instructions are embedded in data

src/content/chapters/13-agents-md-onboarding.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -316,7 +316,7 @@ of your project. Skills provide the "how" - the domain expertise for
316316
doing things well. MCP provides the "what" - the tools and data sources
317317
the agent can access at runtime. A well-configured agent has all three.
318318

319-
![](/agentic-engineering-guide/images/fig-knowledge-stack.png)
319+
![](/images/fig-knowledge-stack.png)
320320

321321
### Anatomy of a skill
322322
A skill is a directory containing a `SKILL.md` file, hosted in a Git
@@ -361,7 +361,7 @@ request per service - a single structured record containing all relevant
361361
context (user identity, business data, feature flags, timing, error
362362
details).
363363

364-
![](/agentic-engineering-guide/images/fig-wide-events.png)
364+
![](/images/fig-wide-events.png)
365365

366366
With such a skill installed, agents writing new endpoints or refactoring
367367
existing ones would automatically apply the wide event pattern - adding

src/content/chapters/14-agent-traces.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ iterations, each showing what the agent decided to do and why. Within
9898
each iteration are the individual tool calls and LLM requests, with
9999
their timing, cost, and results.
100100

101-
![](/agentic-engineering-guide/images/fig-agent-trace.png)
101+
![](/images/fig-agent-trace.png)
102102

103103
Good trace visualization tools
104104
([Jaeger](https://www.jaegertracing.io),

src/content/chapters/17-agent-loop.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ executes that tool, appends the result to the conversation, and sends
1818
everything back to the model. This continues until the model produces a
1919
final answer or hits a limit.
2020

21-
![](/agentic-engineering-guide/images/fig-agent-loop.png).],
21+
![](/images/fig-agent-loop.png).],
2222
)
2323

2424
The simplicity of this loop is deceptive. The engineering challenge

src/content/chapters/18-multi-agent-systems.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ updates docs. Pipelines are simple and predictable, but they’re slow -
8585
each stage must complete before the next begins - and a failure at any
8686
stage blocks the entire pipeline.
8787

88-
![](/agentic-engineering-guide/images/fig-multi-agent.png)
88+
![](/images/fig-multi-agent.png)
8989

9090
## Task decomposition and handoffs
9191
The hardest part of multi-agent systems isn’t the architecture - it’s

src/content/chapters/22-agent-maturity-model.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ infrastructure." The gap between Level 3 and Level 4 is where most risk
3636
is managed - it’s the difference between "we use agents" and "we use
3737
agents safely."
3838

39-
![](/agentic-engineering-guide/images/fig-maturity-model.png)
39+
![](/images/fig-maturity-model.png)
4040

4141
## Maturity assessment
4242
| Dimension | Level 1 | Level 2 | Level 3 | Level 4 | Level 5 |

src/styles/global.css

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,15 @@
66
font-style: normal;
77
font-weight: 100 900;
88
font-display: swap;
9-
src: url("/agentic-engineering-guide/fonts/GeistVF.woff2") format("woff2");
9+
src: url("/fonts/GeistVF.woff2") format("woff2");
1010
}
1111

1212
@font-face {
1313
font-family: "Geist Mono";
1414
font-style: normal;
1515
font-weight: 100 900;
1616
font-display: swap;
17-
src: url("/agentic-engineering-guide/fonts/GeistMonoVF.woff2") format("woff2");
17+
src: url("/fonts/GeistMonoVF.woff2") format("woff2");
1818
}
1919

2020
/* ── Design tokens ── */

0 commit comments

Comments
 (0)