From d62a011efaea89c6c25eeeb981dfa3becee0e6fd Mon Sep 17 00:00:00 2001 From: Yarwin Liu Date: Wed, 5 Jun 2024 12:41:17 -0700 Subject: [PATCH] instructions update --- content/_index.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/content/_index.md b/content/_index.md index a58ba20..eac9072 100755 --- a/content/_index.md +++ b/content/_index.md @@ -11,7 +11,8 @@ CVEX is an executable that runs a software exploit and outputs relevant data in 1. Pull from the GitHub Container Registry (GHCR):   a. 'docker pull ghcr.io/ucsb-seclab/NAME_OF_CONTAINER:TAG'   b. for example, 'docker pull ghcr.io/ucsb-seclab/demo/client:latest' -  c. check each container's README for more details, and [for help on ghcr](https://docs.github.com/en/packages/working-with-a-github-packages-registry/working-with-the-container-registry#pulling-container-images) +  c. go to the github linked to the CVEX and pull the docker-compose file, then run using the command 'docker compose up' +  d. check each container's README for more details, and [for help on ghcr](https://docs.github.com/en/packages/working-with-a-github-packages-registry/working-with-the-container-registry#pulling-container-images) 2. Or (for v2 only): pull from the Github and run as instructed in the README