From 5422bb0e153b44d8e606bfca0e9a78d4f31498c2 Mon Sep 17 00:00:00 2001
From: Mayank Singh <mayank.singh081997@gmail.com>
Date: Wed, 26 Jul 2023 14:22:59 +0000
Subject: [PATCH] Remove description from explain vulnerability prompt

Changelog: changed
EE: true
---
 ee/lib/gitlab/llm/templates/explain_vulnerability.rb   |  6 +++---
 .../gitlab/llm/templates/explain_vulnerability_spec.rb | 10 +++-------
 .../api/graphql/explain_vulnerability_prompt_spec.rb   |  6 +++---
 3 files changed, 9 insertions(+), 13 deletions(-)

diff --git a/ee/lib/gitlab/llm/templates/explain_vulnerability.rb b/ee/lib/gitlab/llm/templates/explain_vulnerability.rb
index f607cc8a87a3..2284b5a70172 100644
--- a/ee/lib/gitlab/llm/templates/explain_vulnerability.rb
+++ b/ee/lib/gitlab/llm/templates/explain_vulnerability.rb
@@ -98,7 +98,7 @@ def eligible_code?
         def prompt_with_code
           <<~PROMPT
           You are a software vulnerability developer.
-          Explain the vulnerability "#{title} - #{description} (#{identifiers})".
+          Explain the vulnerability "#{title} - (#{identifiers})".
           The file "#{filename}" has this vulnerable code:
 
           ```
@@ -116,7 +116,7 @@ def prompt_without_code
 
           <<~PROMPT
           You are a software vulnerability developer.
-          Explain the vulnerability "#{title} - #{description} (#{identifiers})".
+          Explain the vulnerability "#{title} - (#{identifiers})".
           The vulnerable code is in the file "#{filename}".
           Provide a code example with syntax highlighting on how an attacker can take advantage of the vulnerability.
           Provide a code example with syntax highlighting on how to fix it.
@@ -127,7 +127,7 @@ def prompt_without_code
         def prompt_without_file_or_code
           <<~PROMPT
           You are a software vulnerability developer.
-          Explain the vulnerability "#{title} - #{description} (#{identifiers})".
+          Explain the vulnerability "#{title} - (#{identifiers})".
           Provide a code example with syntax highlighting on how an attacker can take advantage of the vulnerability.
           Provide a code example with syntax highlighting on how to fix it.
           Provide the response in markdown format with headers.
diff --git a/ee/spec/lib/gitlab/llm/templates/explain_vulnerability_spec.rb b/ee/spec/lib/gitlab/llm/templates/explain_vulnerability_spec.rb
index b00ef620a3f4..186150a3859a 100644
--- a/ee/spec/lib/gitlab/llm/templates/explain_vulnerability_spec.rb
+++ b/ee/spec/lib/gitlab/llm/templates/explain_vulnerability_spec.rb
@@ -86,10 +86,6 @@
           expect(subject.to_prompt).to include(vulnerability.title)
         end
 
-        it 'includes the description' do
-          expect(subject.to_prompt).to include(vulnerability.description)
-        end
-
         it 'includes the identifiers' do
           expect(subject.to_prompt).to include(identifiers)
         end
@@ -105,7 +101,7 @@
         it 'customizes the prompt' do
           expect(subject.to_prompt).to eq(<<~PROMPT)
           You are a software vulnerability developer.
-          Explain the vulnerability "#{vulnerability.title} - #{vulnerability.description} (#{identifiers})".
+          Explain the vulnerability "#{vulnerability.title} - (#{identifiers})".
           The file "#{File.basename(vulnerability.file)}" has this vulnerable code:
 
           ```
@@ -238,7 +234,7 @@
         let(:expected) do
           <<~PROMPT
           You are a software vulnerability developer.
-          Explain the vulnerability "#{vulnerability.title} - #{vulnerability.description} (#{identifiers})".
+          Explain the vulnerability "#{vulnerability.title} - (#{identifiers})".
           The vulnerable code is in the file "#{File.basename(vulnerability.file)}".
           Provide a code example with syntax highlighting on how an attacker can take advantage of the vulnerability.
           Provide a code example with syntax highlighting on how to fix it.
@@ -268,7 +264,7 @@
       let(:expected) do
         <<~PROMPT
         You are a software vulnerability developer.
-        Explain the vulnerability "#{vulnerability.title} - #{vulnerability.description} (#{identifiers})".
+        Explain the vulnerability "#{vulnerability.title} - (#{identifiers})".
         Provide a code example with syntax highlighting on how an attacker can take advantage of the vulnerability.
         Provide a code example with syntax highlighting on how to fix it.
         Provide the response in markdown format with headers.
diff --git a/ee/spec/requests/api/graphql/explain_vulnerability_prompt_spec.rb b/ee/spec/requests/api/graphql/explain_vulnerability_prompt_spec.rb
index 01145b6fe696..eb3e8073dcc9 100644
--- a/ee/spec/requests/api/graphql/explain_vulnerability_prompt_spec.rb
+++ b/ee/spec/requests/api/graphql/explain_vulnerability_prompt_spec.rb
@@ -103,7 +103,7 @@
           is_expected.to eq(
             <<~PROMPT
               You are a software vulnerability developer.
-              Explain the vulnerability \"#{vulnerability.title} - #{vulnerability.description} ()\".
+              Explain the vulnerability \"#{vulnerability.title} - ()\".
               The file \"main.c\" has this vulnerable code:
 
               ```
@@ -135,7 +135,7 @@
           is_expected.to eq(
             <<~PROMPT
               You are a software vulnerability developer.
-              Explain the vulnerability \"#{vulnerability.title} - #{vulnerability.description} ()\".
+              Explain the vulnerability \"#{vulnerability.title} - ()\".
               The vulnerable code is in the file "main.c".
               Provide a code example with syntax highlighting on how an attacker can take advantage of the vulnerability.
               Provide a code example with syntax highlighting on how to fix it.
@@ -152,7 +152,7 @@
           is_expected.to eq(
             <<~PROMPT
               You are a software vulnerability developer.
-              Explain the vulnerability \"#{vulnerability.title} - #{vulnerability.description} (CVE-2018-1234)\".
+              Explain the vulnerability \"#{vulnerability.title} - (CVE-2018-1234)\".
               The vulnerable code is in the file "App.java".
               Provide a code example with syntax highlighting on how an attacker can take advantage of the vulnerability.
               Provide a code example with syntax highlighting on how to fix it.
-- 
GitLab