Skip to content

Commit f866a12

Browse files
some framing
1 parent e88a5d8 commit f866a12

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

docs/gateway/index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ This enables you to _observe and debug_ your agents in [Invariant Explorer](http
1717

1818
### 1. Getting the Invariant API Key
1919

20-
Navigate to the <img class='inline-invariant' src="../../assets/logo.svg"/> [Invariant Explorer](https://explorer.invariantlabs.ai) and create an account via GitHub Sign-In.
20+
Navigate to the <img class='inline-invariant' src="../assets/logo.svg"/> [Invariant Explorer](https://explorer.invariantlabs.ai) and create an account via GitHub Sign-In.
2121

2222
Once you have created an account, go to your [User Settings](https://explorer.invariantlabs.ai/settings) and generate an API key.
2323

@@ -49,4 +49,4 @@ result = openai.chat.completions.create(
4949
print("result: ", result)
5050
```
5151

52-
This would push your trace to the [Invariant Explorer](https://explorer.invariantlabs.ai/) where it will be available in the dataset name used above.
52+
This would push your trace to the [Invariant Explorer](https://explorer.invariantlabs.ai/) where it will be available in the dataset name used above.

docs/index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@ title: Welcome
44

55
# Invariant Agent Security and Debugging
66

7-
<div class='subtitle'>A toolchain for securing and debugging agentic AI systems.</div>
7+
<div class='subtitle'>A security and debugging layer for agentic AI systems.</div>
88

9-
The Invariant eco-system offers a toolchain for building and securing agentic AI systems. It is designed to help you build secure agentic systems _from scratch_ or to _secure an existing system with very little overhead_.
9+
The Invariant eco-system offers a toolchain for building and securing agentic AI systems. It can be used both to build secure agentic AI systems _from scratch_, and to _secure existing or deployed AI agents_ in an organization.
1010

1111
For this, it relies on an entirely transparent proxy that intercepts and traces the LLM calls of your agent. This enables security guardrailing and insights during operation, without requiring any code changes to the agent.
1212

0 commit comments

Comments
 (0)