diff --git a/ee/lib/gitlab/llm/templates/explain_vulnerability.rb b/ee/lib/gitlab/llm/templates/explain_vulnerability.rb index f607cc8a87a3960b974832c3b4ad0c02085d024c..2284b5a701720a27545bfdc470d856cd98c95215 100644 --- a/ee/lib/gitlab/llm/templates/explain_vulnerability.rb +++ b/ee/lib/gitlab/llm/templates/explain_vulnerability.rb @@ -98,7 +98,7 @@ def eligible_code? def prompt_with_code <<~PROMPT You are a software vulnerability developer. - Explain the vulnerability "#{title} - #{description} (#{identifiers})". + Explain the vulnerability "#{title} - (#{identifiers})". The file "#{filename}" has this vulnerable code: ``` @@ -116,7 +116,7 @@ def prompt_without_code <<~PROMPT You are a software vulnerability developer. - Explain the vulnerability "#{title} - #{description} (#{identifiers})". + Explain the vulnerability "#{title} - (#{identifiers})". The vulnerable code is in the file "#{filename}". Provide a code example with syntax highlighting on how an attacker can take advantage of the vulnerability. Provide a code example with syntax highlighting on how to fix it. @@ -127,7 +127,7 @@ def prompt_without_code def prompt_without_file_or_code <<~PROMPT You are a software vulnerability developer. - Explain the vulnerability "#{title} - #{description} (#{identifiers})". + Explain the vulnerability "#{title} - (#{identifiers})". Provide a code example with syntax highlighting on how an attacker can take advantage of the vulnerability. Provide a code example with syntax highlighting on how to fix it. Provide the response in markdown format with headers. diff --git a/ee/spec/lib/gitlab/llm/templates/explain_vulnerability_spec.rb b/ee/spec/lib/gitlab/llm/templates/explain_vulnerability_spec.rb index b00ef620a3f488398889b121405e7c16dd339ce7..186150a3859acbcbe0b5aceaccb180bdccd27ddb 100644 --- a/ee/spec/lib/gitlab/llm/templates/explain_vulnerability_spec.rb +++ b/ee/spec/lib/gitlab/llm/templates/explain_vulnerability_spec.rb @@ -86,10 +86,6 @@ expect(subject.to_prompt).to include(vulnerability.title) end - it 'includes the description' do - expect(subject.to_prompt).to include(vulnerability.description) - end - it 'includes the identifiers' do expect(subject.to_prompt).to include(identifiers) end @@ -105,7 +101,7 @@ it 'customizes the prompt' do expect(subject.to_prompt).to eq(<<~PROMPT) You are a software vulnerability developer. - Explain the vulnerability "#{vulnerability.title} - #{vulnerability.description} (#{identifiers})". + Explain the vulnerability "#{vulnerability.title} - (#{identifiers})". The file "#{File.basename(vulnerability.file)}" has this vulnerable code: ``` @@ -238,7 +234,7 @@ let(:expected) do <<~PROMPT You are a software vulnerability developer. - Explain the vulnerability "#{vulnerability.title} - #{vulnerability.description} (#{identifiers})". + Explain the vulnerability "#{vulnerability.title} - (#{identifiers})". The vulnerable code is in the file "#{File.basename(vulnerability.file)}". Provide a code example with syntax highlighting on how an attacker can take advantage of the vulnerability. Provide a code example with syntax highlighting on how to fix it. @@ -268,7 +264,7 @@ let(:expected) do <<~PROMPT You are a software vulnerability developer. - Explain the vulnerability "#{vulnerability.title} - #{vulnerability.description} (#{identifiers})". + Explain the vulnerability "#{vulnerability.title} - (#{identifiers})". Provide a code example with syntax highlighting on how an attacker can take advantage of the vulnerability. Provide a code example with syntax highlighting on how to fix it. Provide the response in markdown format with headers. diff --git a/ee/spec/requests/api/graphql/explain_vulnerability_prompt_spec.rb b/ee/spec/requests/api/graphql/explain_vulnerability_prompt_spec.rb index 01145b6fe696de46a0fb74856c91fd9ee82ae41a..eb3e8073dcc99eaf1f39aa36f89890715f8fa459 100644 --- a/ee/spec/requests/api/graphql/explain_vulnerability_prompt_spec.rb +++ b/ee/spec/requests/api/graphql/explain_vulnerability_prompt_spec.rb @@ -103,7 +103,7 @@ is_expected.to eq( <<~PROMPT You are a software vulnerability developer. - Explain the vulnerability \"#{vulnerability.title} - #{vulnerability.description} ()\". + Explain the vulnerability \"#{vulnerability.title} - ()\". The file \"main.c\" has this vulnerable code: ``` @@ -135,7 +135,7 @@ is_expected.to eq( <<~PROMPT You are a software vulnerability developer. - Explain the vulnerability \"#{vulnerability.title} - #{vulnerability.description} ()\". + Explain the vulnerability \"#{vulnerability.title} - ()\". The vulnerable code is in the file "main.c". Provide a code example with syntax highlighting on how an attacker can take advantage of the vulnerability. Provide a code example with syntax highlighting on how to fix it. @@ -152,7 +152,7 @@ is_expected.to eq( <<~PROMPT You are a software vulnerability developer. - Explain the vulnerability \"#{vulnerability.title} - #{vulnerability.description} (CVE-2018-1234)\". + Explain the vulnerability \"#{vulnerability.title} - (CVE-2018-1234)\". The vulnerable code is in the file "App.java". Provide a code example with syntax highlighting on how an attacker can take advantage of the vulnerability. Provide a code example with syntax highlighting on how to fix it.