Secure Code Warrior® AI Challenge player has been redesigned to present the challenges in the style of an in-IDE coding session with simulated AI coding assistance. Feedback now appears in a dedicated panel on the right, mimicking the type of guidance developers might see when working with AI coding assistance.
IMPORTANT: This is a simulation only. No real AI is being used. The feedback in this panel is predesigned to mimic the experience of AI coding assistance.
How to Play AI Challenge
Step 1
Navigate to Explore from the top menu
Step 2
From the activity type filter, choose "Challenge: AI "
Step 3
Select the challenge you want to complete
Tip: You can filter by role, language, and vulnerability category
Step 4
Now, check the panel on the right-hand side. The simulated AI coding assistance will present a short description, outline the proposed change, and show the files that were updated. Your task isn't to write code, but to review these changes for potential vulnerabilities, and decide whether to accept or reject the code
Note: Imagine you’ve been working on code changes with the help of an AI coding assistant, and now you have to review the changes for potential security issues.
Step 5
The flow will vary depending on whether you accept or reject the code
1. Accept vulnerable code
If you accept the code and it contains vulnerabilities, you will receive feedback highlighting the vulnerable line(s) of code for you to review, and select the vulnerability in the code
2. Reject vulnerable code
If you reject the code, you need to provide a reason for the rejection by identifying the specific line(s) that you believe contain the issue.
When you select a piece of code, you will be prompted to confirm that this is the insecure code you want to flag. Click Yes to proceed
Step 6
If the selected piece of code contains a vulnerability, you will receive feedback confirming that you are correct. You will then be prompted to select the vulnerability introduced by the code.
Select the appropriate vulnerability and click the "Submit" button to proceed
If you select the wrong vulnerability, you will receive feedback indicating that your choice was incorrect. You will have the opportunity to try again by selecting a different vulnerability.
Select a different vulnerability and click the "Submit" button to proceed
Step 7
Upon selecting the correct vulnerability in the code, you will be prompted to select the best way to fix it without breaking the functionality.
Select one of the provided options and click the "Submit" button to proceed.
Step 8
If you select the correct fix, you will receive feedback confirming your choice. If you select the wrong fix you will also receive feedback indicating that your selection was incorrect, and you will be prompted to choose a different fix
Make sure you check the key takeaways section, which provides:
- An overview of the vulnerability
- Reasons why the selected fix was the best solution.
- More clarity on why the other options weren't ideal.
Note: We provide the same set of feedback at the end of the activity regardless of how you answered it
Share Your Feedback With Us
We are so keen to hear your feedback! If you want to have a hand in shaping the next version of our challenges, let us know what you think. Please submit your feedback via the "Submit bug or feedback" button on the platform.
Comments
0 comments
Please sign in to leave a comment.