Skip to content

Commit a5ab0a7

Browse files
authored
fix picture alignment and minor wording tweaks
1 parent dd17c3f commit a5ab0a7

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

.github/steps/2-step.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -34,14 +34,14 @@ To see how Code Scanning works, we will introduce a vulnerability into the `rout
3434

3535
1. Scroll to the bottom of the pull request and search for a check named `CodeQL`. This is the analysis job scanning the proposed code changes in the pull request.
3636

37-
<img width="500" alt="pr panel" src="https://github.com/user-attachments/assets/1c29ee0f-cc1d-4568-9e71-338d45ad1d54"/>
37+
<img width="500" alt="CodeQL check in progress" src="https://github.com/user-attachments/assets/3c1721cf-e18d-4b8a-8feb-615033d53f4c" />
3838

3939
1. If the job is still running, wait a few minutes for it to complete.
4040

4141
1. Search the comments to find the results of the analysis.
4242

4343
- Notice that the results found a SQL injection vulnerability. It also suggests a fix.
44-
- Don't worry about responding or resolving this problem (yet).
44+
- Don't worry about responding to this or resolving the problem (yet).
4545

4646
<img width="500" alt="code scan results" src="https://github.com/user-attachments/assets/1914befe-e091-4905-bfdc-a5a252a73d2d" />
4747

@@ -53,11 +53,11 @@ To see how Code Scanning works, we will introduce a vulnerability into the `rout
5353

5454
1. In the left navigation, select the **CodeQL** entry to filter the workflow runs.
5555

56-
<img width="500" alt="codeql filter" src="https://github.com/user-attachments/assets/9b66339d-0fba-4a72-be2e-5a0b2b5677b7"/>
56+
<img width="500" alt="codeql filter" src="https://github.com/user-attachments/assets/9b66339d-0fba-4a72-be2e-5a0b2b5677b7"/>
5757

5858
1. Click on the workflow run with the name **PR #2** to open a page with more details.
5959

60-
<img width="500" alt="codeql setup" src="https://github.com/user-attachments/assets/016a729e-3b41-466c-8edf-3d4b41a86b7d"/>
60+
<img width="500" alt="codeql setup" src="https://github.com/user-attachments/assets/016a729e-3b41-466c-8edf-3d4b41a86b7d"/>
6161

6262
1. Expand the run jobs by clicking **Show all jobs** then click on the **Analyze (python)** entry. The list of all workflow steps is now shown.
6363

@@ -67,7 +67,7 @@ To see how Code Scanning works, we will introduce a vulnerability into the `rout
6767

6868
1. Find the analysis entry and consider reviewing the logs.
6969

70-
<img width="500" alt="python analysis logs" src="https://github.com/user-attachments/assets/56ac1cf6-8e51-4e1f-b7f5-2dd48a5e5614" />
70+
<img width="500" alt="python analysis logs" src="https://github.com/user-attachments/assets/56ac1cf6-8e51-4e1f-b7f5-2dd48a5e5614" />
7171

7272
1. With the pull request started and CodeQL scan finished, Mona will check your progress and share the next steps.
7373

0 commit comments

Comments
 (0)