Skip to content

Conversation

@rrama
Copy link
Contributor

@rrama rrama commented Dec 5, 2025

Description

Also remove redundant tree view refreshes after changing filters, LS refreshes the trees with new diagnostics.

Relies on snyk/snyk-ls#1081

Checklist

Screenshots / GIFs

Screenshot 2025-12-05 at 15 47 38

Also remove redundant tree view refreshes after changing filters, LS refreshes the trees with new diagnostics.
@snyk-io
Copy link

snyk-io bot commented Dec 5, 2025

Snyk checks have passed. No issues have been found so far.

Status Scanner Critical High Medium Low Total (0)
Open Source Security 0 0 0 0 0 issues
Licenses 0 0 0 0 0 issues
Code Security 0 0 0 0 0 issues

💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse.

@gemini-code-assist
Copy link

Summary of Changes

Hello @rrama, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

This pull request enhances the Snyk VS Code extension by adding a new feature that enables users to filter Open Source issues based on a configurable risk score threshold. This provides more precise control over which issues are displayed, helping users prioritize. Concurrently, the PR optimizes the extension's performance by eliminating unnecessary UI refreshes, relying on the Language Server for diagnostic updates, which streamlines the filtering process.

Highlights

  • Risk Score Filter: Introduced a new configuration setting, snyk.riskScoreThreshold, allowing users to filter Open Source issues based on their risk score. Issues with a risk score below the set threshold will not be displayed.
  • Optimized UI Refresh: Removed redundant tree view refreshes that previously occurred when filter settings were changed. The Language Server now handles the refreshing of trees with new diagnostics, leading to a more efficient user experience.
Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point by creating a comment using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands on the current page.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in pull request comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here.

You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

Copy link

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request introduces a new "Risk Score Threshold" filter for Open Source issues, allowing users to focus on higher-risk vulnerabilities. The implementation is clean and consistent across the configuration, language server settings, and tests. I particularly appreciate the removal of redundant tree view refreshes from the configurationWatcher, delegating this responsibility to the Language Server. This is a great improvement for performance and code architecture, as the LS is the source of truth for diagnostics. The changes are well-executed and I have no further suggestions for improvement. Great work!

@rrama rrama marked this pull request as ready for review December 5, 2025 15:53
@rrama rrama requested review from a team as code owners December 5, 2025 15:53
return extension.viewManagerService.refreshAllCodeAnalysisViews();
} else if (key === IAC_ENABLED_SETTING) {
return extension.viewManagerService.refreshIacView();
} else if (key === ISSUE_VIEW_OPTIONS_SETTING) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

why?

Copy link
Contributor Author

@rrama rrama Dec 9, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LS refreshes the trees with new diagnostics, this was redundant when I tested.


get riskScoreThreshold(): number {
return (
this.workspace.getConfiguration<number>(
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

how does it handle 3 layer settings?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We are doing risk scores at the global level now. See this edit to the pitch for more details.

@nick-y-snyk nick-y-snyk self-requested a review December 9, 2025 10:09
@rrama rrama added the ⚠️ DON'T MERGE Shouldn't be merged yet. label Dec 9, 2025
@rrama
Copy link
Contributor Author

rrama commented Dec 9, 2025

Thanks for the review Nick, I am holding off the merge until LS changes go through AND we are given the all clear from the risk score leads.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

⚠️ DON'T MERGE Shouldn't be merged yet.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants