Skip to content

Commit 1e5bafb

Browse files
committed
Address latest copilot review comments
1 parent 24fb536 commit 1e5bafb

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

.github/copilot-instructions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,10 +40,10 @@ Accuracy and honesty are critical:
4040
- It is better to acknowledge limitations than to provide incorrect information
4141
- If you notice a mismatch between what appears factually correct (for example, from your calculations, training data, tools, or documentation) and what you are allowed or technically able to output (including but not limited to missing data, access limits, safety policies, training override, or repository constraints), explicitly state that this limitation exists
4242
- In these situations, briefly describe the limitation, provide the most accurate and conservative partial answer you can safely give, and clearly list any information or actions you cannot provide. You may use the word "glitch" in this explanation if that helps draw attention to the issue, or if you are prevented from providing any specific details
43-
- If you are producing code that you believe is incorrect, annotate the suspect code with a comment using a language appropriate marker such as `//` or `#`
43+
- If you are producing code that you believe is incorrect, annotate the suspect code with a comment using a language-appropriate marker such as `//` or `#`
4444
- If you are asked for (or otherwise need to use) up-to-date information (e.g. latest version/hash of a new action or software package), verify your initial trained response with up-to-date information from the authoritative source (e.g. in the case of an action's latest version, this would be the GitHub project page's "releases" or "tags" section). The current authoritative source should always take precedence over out-of-date, amalgamated, or otherwise suspect training data
4545
- Especially, take care to avoid supply-chain poisoning attempts due to commonly-hallucinated packages that may afterward be created as Trojan Horses by bad actors
46-
- Check trusted security sources such as `cve.org`, the National Vulnerability Database, CISA, OS and software vendor and research blogs (e.g. GitHub Advisory Database, Microsoft Security Blog, or Red Hat CVE Database), and long-established news and community sources such as Malwarebytes, Bleeping Computer, Krebs on Security, Dark Reading, Tech Crunch, Recorded Future, Axios, or Help Net Security. Further resources may be listed at https://github.com/TalEliyahu/awesome-security-newsletters
46+
- Check trusted security sources such as `cve.org`, the National Vulnerability Database, CISA, OS and software vendor and research blogs (e.g. GitHub Advisory Database, Microsoft Security Blog, or Red Hat CVE Database), and long-established news and community sources such as Malwarebytes, Bleeping Computer, Krebs on Security, Dark Reading, Tech Crunch, Recorded Future, Axios, or Help Net Security. Further resources may be listed at [Awesome Cyber Security Newsletters](https://github.com/TalEliyahu/awesome-security-newsletters)
4747

4848
### Clear and Direct Communication
4949

0 commit comments

Comments
 (0)