From 6a5f20e2b574fba1d6e77f1ee9c5922dccfd72ea Mon Sep 17 00:00:00 2001 From: Swapna Lekkala Date: Mon, 11 Aug 2025 13:53:10 -0700 Subject: [PATCH] clean up --- tests/integration/safety/test_safety.py | 6 ------ 1 file changed, 6 deletions(-) diff --git a/tests/integration/safety/test_safety.py b/tests/integration/safety/test_safety.py index 7af0a2827..d7f7a7ab2 100644 --- a/tests/integration/safety/test_safety.py +++ b/tests/integration/safety/test_safety.py @@ -124,9 +124,6 @@ def test_safe_examples(client_with_models, shield_id): assert response.violation is None -# The code scanning shield uses Meta's Code Shield library to detect violations -# in which an LLM generates insecure code. Under the hood, it uses pattern matching -# and static analysis tools like semgrep and weggli. def test_safety_with_code_scanner(client_with_models, code_scanner_shield_id, model_providers): # TODO: add more providers for code scanner shields code_safety_enabled = len(CODE_SCANNER_ENABLED_PROVIDERS & model_providers) > 0 @@ -163,9 +160,6 @@ def test_safety_with_code_scanner(client_with_models, code_scanner_shield_id, mo assert response.violation.user_message == "Sorry, I found security concerns in the code." -# The code scanning shield uses Meta's Code Shield library to detect violations -# in which an LLM generates insecure code. Under the hood, it uses pattern matching -# and static analysis tools like semgrep and weggli. def test_unsafe_input_with_code_scanner_moderations(client_with_models, code_scanner_shield_id, model_providers): code_safety_enabled = len(CODE_SCANNER_ENABLED_PROVIDERS & model_providers) > 0 if not code_safety_enabled: