Skip to content

Commit 15c4353

Browse files
authored
Merge pull request #671 from timdeschryver/patch-1
fix: markdown formatting in code review examples
2 parents 62ddc00 + 83fe668 commit 15c4353

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

instructions/code-review-generic.instructions.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -242,7 +242,7 @@ Explanation of the impact or reason for the suggestion.
242242
### Example Comments
243243

244244
#### Critical Issue
245-
```markdown
245+
````markdown
246246
**🔴 CRITICAL - Security: SQL Injection Vulnerability**
247247

248248
The query on line 45 concatenates user input directly into the SQL string,
@@ -265,10 +265,10 @@ stmt.setString(1, email);
265265
```
266266

267267
**Reference:** OWASP SQL Injection Prevention Cheat Sheet
268-
```
268+
````
269269

270270
#### Important Issue
271-
```markdown
271+
````markdown
272272
**🟡 IMPORTANT - Testing: Missing test coverage for critical path**
273273

274274
The `processPayment()` function handles financial transactions but has no tests
@@ -290,10 +290,10 @@ test('should process full refund when order is cancelled', () => {
290290
expect(result.status).toBe('refunded');
291291
});
292292
```
293-
```
293+
````
294294

295295
#### Suggestion
296-
```markdown
296+
````markdown
297297
**🟢 SUGGESTION - Readability: Simplify nested conditionals**
298298

299299
The nested if statements on lines 30-40 make the logic hard to follow.
@@ -318,7 +318,7 @@ if (!user || !user.isActive || !user.hasPermission('write')) {
318318
}
319319
// do something
320320
```
321-
```
321+
````
322322

323323
## Review Checklist
324324

0 commit comments

Comments
 (0)