# Overview

### Getting Started

<table data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><strong>What is Shepherd?</strong></td><td><mark style="color:$info;">Overview of Shepherd and what we do</mark></td><td><a href="/pages/eYIcKArRDiNoqd0hDPMJ">/pages/eYIcKArRDiNoqd0hDPMJ</a></td></tr><tr><td><strong>Core Concepts</strong></td><td><mark style="color:$info;">Key terms and ideas</mark></td><td><a href="/pages/E9o9kIyf1mxDvstPmaZP">/pages/E9o9kIyf1mxDvstPmaZP</a></td></tr><tr><td><strong>How Shepherd Works</strong></td><td><mark style="color:$info;">The technical workflow from setup to results</mark></td><td><a href="/pages/4xKjPfOBYOnDKya8viVU">/pages/4xKjPfOBYOnDKya8viVU</a></td></tr></tbody></table>

### Product

<table data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><strong>Triager</strong></td><td><mark style="color:$info;">Automated evidence collection for bug bounty submissions. Accept or reject findings in minutes.</mark></td><td></td></tr><tr><td><strong>Digital Twin</strong></td><td><mark style="color:$info;">How Shepherd creates and maintains your protocol's security</mark></td><td><a href="/pages/U9JEn4W8RdATvEn7MBzA">/pages/U9JEn4W8RdATvEn7MBzA</a></td></tr><tr><td><strong>Adversarial Agents</strong></td><td><mark style="color:$info;">How our agents discover and validate vulnerabilities</mark></td><td><a href="/pages/bkAV4JckMgqrXzduXmdR">/pages/bkAV4JckMgqrXzduXmdR</a></td></tr><tr><td><strong>Exploit Proofs</strong></td><td><mark style="color:$info;">Understanding the validated findings Shepherd produces</mark></td><td><a href="/pages/RsaTTQDCW0gzg1VepOym">/pages/RsaTTQDCW0gzg1VepOym</a></td></tr></tbody></table>

### Concepts

<table data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><strong>Code vs. Economic Layer</strong></td><td><mark style="color:$info;">The two categories of smart contract vulnerabilities</mark></td><td><a href="/pages/PTNiBR6acK238oBwx5fd">/pages/PTNiBR6acK238oBwx5fd</a></td></tr></tbody></table>

### FAQ

<table data-view="cards"><thead><tr><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><strong>General</strong></td><td><mark style="color:$info;">Common questions about Shepherd, security, and how we fit into your workflow</mark></td><td><a href="/pages/VcGcHIEWaVpdViMgr1jD">/pages/VcGcHIEWaVpdViMgr1jD</a></td></tr></tbody></table>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://shepherd-2.gitbook.io/shepherd-docs/overview.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
