Alessandro commited on
Commit
081fb0f
·
1 Parent(s): d1e5e83

broken img fix

Browse files
docs/res/code_exec_death.PNG DELETED
Binary file (24.9 kB)
 
docs/res/code_exec_jailbreak.png ADDED

Git LFS Details

  • SHA256: fcb99aff6eaab310a9c3215e424ab49ffb3bc070dfd7b445da2bef56a78b7788
  • Pointer size: 130 Bytes
  • Size of remote file: 39.4 kB
docs/usage.md CHANGED
@@ -80,7 +80,7 @@ This is a very dangerous feature, and we are not responsible for any damage or o
80
 
81
  - If you are a power-user and 100% sure of what you're doing, you can use the code_execution_tool outside of the Docker container by following these steps:
82
 
83
- ![Code Execution Jailbreak](res/code_exec_death.png)
84
 
85
  1. After the installation and configuration of your Agent Zero instance, go in `initialize.py` and set the `code_exec_docker_enabled` to `False` (line 47). This will disable the code_execution_tool for your Agent Zero instance to communicate with the Docker container. The tool will search for an SSH connection at this point.
86
 
 
80
 
81
  - If you are a power-user and 100% sure of what you're doing, you can use the code_execution_tool outside of the Docker container by following these steps:
82
 
83
+ ![Code Execution Jailbreak](res/code_exec_jailbreak.png)
84
 
85
  1. After the installation and configuration of your Agent Zero instance, go in `initialize.py` and set the `code_exec_docker_enabled` to `False` (line 47). This will disable the code_execution_tool for your Agent Zero instance to communicate with the Docker container. The tool will search for an SSH connection at this point.
86