From 187c9d25e91911e9dcba88702a6422b24df64e18 Mon Sep 17 00:00:00 2001 From: Tim Deschryver <28659384+timdeschryver@users.noreply.github.com> Date: Fri, 6 Feb 2026 10:06:31 +0100 Subject: [PATCH 1/2] fix: markdown formatting in code review examples Updated markdown code blocks for example comments in the code review instructions. --- instructions/code-review-generic.instructions.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/instructions/code-review-generic.instructions.md b/instructions/code-review-generic.instructions.md index c8a1ca296..b4c21ff69 100644 --- a/instructions/code-review-generic.instructions.md +++ b/instructions/code-review-generic.instructions.md @@ -242,7 +242,7 @@ Explanation of the impact or reason for the suggestion. ### Example Comments #### Critical Issue -```markdown +````markdown **🔴 CRITICAL - Security: SQL Injection Vulnerability** The query on line 45 concatenates user input directly into the SQL string, @@ -290,10 +290,10 @@ test('should process full refund when order is cancelled', () => { expect(result.status).toBe('refunded'); }); ``` -``` +```` #### Suggestion -```markdown +````markdown **🟢 SUGGESTION - Readability: Simplify nested conditionals** The nested if statements on lines 30-40 make the logic hard to follow. @@ -318,7 +318,7 @@ if (!user || !user.isActive || !user.hasPermission('write')) { } // do something ``` -``` +```` ## Review Checklist From 83fe668a7c8a5eeed990af7b8e19bda8d73c120d Mon Sep 17 00:00:00 2001 From: Tim Deschryver <28659384+timdeschryver@users.noreply.github.com> Date: Fri, 6 Feb 2026 11:16:26 +0100 Subject: [PATCH 2/2] fix markdown code blocks --- instructions/code-review-generic.instructions.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/instructions/code-review-generic.instructions.md b/instructions/code-review-generic.instructions.md index b4c21ff69..bcd7365da 100644 --- a/instructions/code-review-generic.instructions.md +++ b/instructions/code-review-generic.instructions.md @@ -265,10 +265,10 @@ stmt.setString(1, email); ``` **Reference:** OWASP SQL Injection Prevention Cheat Sheet -``` +```` #### Important Issue -```markdown +````markdown **🟡 IMPORTANT - Testing: Missing test coverage for critical path** The `processPayment()` function handles financial transactions but has no tests