Skip to content

Commit 68e3319

Browse files
[Doc]: fixing typos in different files (#369)
1 parent da6aada commit 68e3319

File tree

6 files changed

+12
-12
lines changed

6 files changed

+12
-12
lines changed

benchmarks/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -307,8 +307,8 @@ This is an example of how a text sould be sanitized:
307307

308308
Some annotation rules:
309309
- Each detected entity should be sanitized using the **format: [ENTITY_TYPE]**
310-
- Priorize IP_ADDRESS to URL: `https://192.168.2.100` is anonimized like this: `https://[IP_ADDRESS]:5050` instead of [URL]
311-
- DATE_TIME is used for dates and for times, in this case `2025-03-11 11:41 UTC` it sould be anonimized like this: ` [DATE_TIME] [DATE_TIME]`
310+
- Priorize IP_ADDRESS to URL: `https://192.168.2.100` is anonymized like this: `https://[IP_ADDRESS]:5050` instead of [URL]
311+
- DATE_TIME is used for dates and for times, in this case `2025-03-11 11:41 UTC` it should be anonymized like this: ` [DATE_TIME] [DATE_TIME]`
312312

313313
If you have any questions about the annotation, please write to us.
314314

docs/cai_benchmark.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -171,7 +171,7 @@ Currently, supporting the following benchmarks, refer to [`ctf_configs.jsonl`](h
171171

172172
[^3]: **Medium (`Graduate Level`)**: Aimed at participants with a solid grasp of cybersecurity principles. Focus areas include intermediate exploits including web shells, network traffic analysis, and steganography.
173173

174-
[^4]: **Hard (`Professionals`)**: Crafted for experienced penetration testers. Focus areas include advanced techniques such as heap exploitation, kernel vulnerabilities, and complex multi-step challenges.
174+
[^4]: **Hard (`Professionals`)**: Crafted for experienced penetration testers. Focus areas include advanced techniques such as heap exploitation, kernel vulnerabilities, and complex multistep challenges.
175175

176176
[^5]: **Very Hard (`Elite`)**: Designed for elite, highly skilled participants requiring innovation. Focus areas include cutting-edge vulnerabilities like zero-day exploits, custom cryptography, and hardware hacking.
177177

@@ -215,7 +215,7 @@ Some of the backends need and url to the api base, set as follows in .env: NAME_
215215
OLLAMA_API_BASE="..."
216216
OPENROUTER_API_BASE="..."
217217
```
218-
Once evething is configured run the script
218+
Once everything is configured run the script
219219

220220
```bash
221221
python benchmarks/eval.py --model MODEL_NAME --dataset_file INPUT_FILE --eval EVAL_TYPE --backend BACKEND
@@ -324,7 +324,7 @@ IBAN
324324
EUROPEAN_BANK_ACCOUNT
325325
```
326326

327-
This is an example of how a text sould be sanitized:
327+
This is an example of how a text should be sanitized:
328328

329329
```
330330
"Contact Mikel at mikel@example.com" → "Contact [PERSON] at [EMAIL_ADDRESS]"
@@ -333,8 +333,8 @@ This is an example of how a text sould be sanitized:
333333

334334
Some annotation rules:
335335
- Each detected entity should be sanitized using the **format: [ENTITY_TYPE]**
336-
- Priorize IP_ADDRESS to URL: `https://192.168.2.100` is anonimized like this: `https://[IP_ADDRESS]:5050` instead of [URL]
337-
- DATE_TIME is used for dates and for times, in this case `2025-03-11 11:41 UTC` it sould be anonimized like this: ` [DATE_TIME] [DATE_TIME]`
336+
- Priorize IP_ADDRESS to URL: `https://192.168.2.100` is anonymized like this: `https://[IP_ADDRESS]:5050` instead of [URL]
337+
- DATE_TIME is used for dates and for times, in this case `2025-03-11 11:41 UTC` it should be anonymized like this: ` [DATE_TIME] [DATE_TIME]`
338338

339339
If you have any questions about the annotation, please write to us.
340340

@@ -397,7 +397,7 @@ python benchmarks/eval.py --model alias1 --dataset_file benchmarks/cyberPII-benc
397397
The input CSV file must contain the following columns:
398398

399399
- id: Unique row identifier
400-
- target_text: The original text from memory01_80 dataseto be annotated
400+
- target_text: The original text from memory01_80 dataset to be annotated
401401
- target_text_{annotator}_sanitized: The sanitized version of the text produced by each annotator
402402

403403

docs/cai_prompt_injection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
## Summary
44

5-
This implementation adds guardrails to protect CAI agents from prompt injection attacks when interacting with untrusted external content (web pages, server responses, CTF challenges, etc).
5+
This implementation adds guardrails to protect CAI agents from prompt injection attacks when interacting with untrusted external content (web pages, server responses, CTF challenges, etc.).
66

77
## Problem
88

docs/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ CAI's capabilities are validated through rigorous peer-reviewed research demonst
118118

119119
## Motivation
120120
### Why CAI?
121-
The cybersecurity landscape is undergoing a dramatic transformation as AI becomes increasingly integrated into security operations. **We predict that by 2028, AI-powered security testing tools will outnumber human pentesters**. This shift represents a fundamental change in how we approach cybersecurity challenges. *AI is not just another tool - it's becoming essential for addressing complex security vulnerabilities and staying ahead of sophisticated threats. As organizations face more advanced cyber attacks, AI-enhanced security testing will be crucial for maintaining robust defenses.*
121+
The cybersecurity landscape is undergoing a dramatic transformation as AI becomes increasingly integrated into security operations. **We predict that by 2028, AI-powered security testing tools will outnumber human pentesters**. This shift represents a fundamental change in how we approach cybersecurity challenges. *AI is not just another tool - it's becoming essential for addressing complex security vulnerabilities and staying ahead of sophisticated threats. As organizations face more advanced cyberattacks, AI-enhanced security testing will be crucial for maintaining robust defenses.*
122122

123123
This work builds upon prior efforts[1] and similarly, we believe that democratizing access to advanced cybersecurity AI tools is vital for the entire security community. That's why we're releasing Cybersecurity AI (`CAI`) as an open source framework. Our goal is to empower security researchers, ethical hackers, and organizations to build and deploy powerful AI-driven security tools. By making these capabilities openly available, we aim to level the playing field and ensure that cutting-edge security AI technology isn't limited to well-funded private companies or state actors.
124124

docs/multi_agent.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ While orchestrating via LLM is powerful, orchestrating via code makes tasks more
2626

2727
- Using [Guardrails](guardrails.md) and LLM_as_judge: They are agents that evaluates and provides feedback, until they says the inputs/outputs passes certain criteria. The agent ensures inputs/outputs are appropriate.
2828

29-
- Paralelization of task: Running multiple agents in parallel. This is useful for speed when you have multiple tasks.
29+
- Parallelization of task: Running multiple agents in parallel. This is useful for speed when you have multiple tasks.
3030

3131
## Running Agents in Parallel
3232

src/cai/tools/web/search_web.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ def query_perplexity(query: str = "", context: str = "") -> str:
4040
"over general explanations. Your team relies on your research to "
4141
"identify attack vectors, bypass security controls, and capture "
4242
"flags. Always suggest concrete next steps based on your findings."
43-
"Put the neccesary code in each iteration"
43+
"Put the necessary code in each iteration"
4444
),
4545
},
4646
{

0 commit comments

Comments
 (0)