SAM FIGUEROA activity https://gitlab.com/sam.figueroa 2026-03-19T11:27:57Z tag:gitlab.com,2026-03-19:5221683678 SAM FIGUEROA commented on merge request !4928 at GitLab.org / ModelOps / AI Assisted (formerly Applied ML) / Code Suggestions / AI Gateway 2026-03-19T11:27:57Z sam.figueroa SAM FIGUEROA

@Joey_Khabie & @nateweinshenker can you please do initial reviews here?

tag:gitlab.com,2026-03-19:5221672174 SAM FIGUEROA pushed to project branch sf/fix/correct-param-for-flag-origin-593773 at GitLab.org / ModelOps / AI Assisted (formerly Applied ML) / Code Sugges... 2026-03-19T11:25:13Z sam.figueroa SAM FIGUEROA

SAM FIGUEROA (757f33ba) at 19 Mar 11:25

fix: Correct origin param for vuln flag on secret_fp

tag:gitlab.com,2026-03-18:5217115045 SAM FIGUEROA pushed to project branch sf/fix/correct-param-for-flag-origin-593773 at GitLab.org / ModelOps / AI Assisted (formerly Applied ML) / Code Sugges... 2026-03-18T11:42:56Z sam.figueroa SAM FIGUEROA

SAM FIGUEROA (893cf531) at 18 Mar 11:42

fix: Correct origin param for vuln flag on secret_fp

tag:gitlab.com,2026-03-18:5217007238 SAM FIGUEROA commented on merge request !227574 at GitLab.org / GitLab 2026-03-18T11:17:42Z sam.figueroa SAM FIGUEROA

I've added a related change to ai-gateway to match this change on the source side: gitlab-org/modelops/applied-ml/code-suggestions/ai-assist!4928

Approving!

tag:gitlab.com,2026-03-18:5217006130 SAM FIGUEROA approved merge request !227574: Improve flag origin handling for Secret Detection FP at GitLab.org / GitLab 2026-03-18T11:17:26Z sam.figueroa SAM FIGUEROA

What does this MR do and why?

This MR implements Phase 1 of #593773 by introducing a new origin constant for Secret Detection FP flags and creating an AI_MANAGED_ORIGINS array to handle all AI-managed flag types in a maintainable way.

Context: Currently, both SAST and Secret Detection FP flags use the same origin (ai_sast_fp_detection) because the DWS sends a detection_type parameter that isn't honored by the Rails API. This works but makes it impossible to distinguish between the two types of flags.

Backward Compatibility

This is a backward-compatible change. Secret Detection FP will continue to work with the default SAST origin until the DWS side is updated to send the new origin parameter (Phase 2).

The ingestion logic now preserves flags with either origin, so when DWS starts sending the new origin value, the flags will be properly preserved without any additional changes needed.

tag:gitlab.com,2026-03-18:5217001122 SAM FIGUEROA commented on merge request !4928 at GitLab.org / ModelOps / AI Assisted (formerly Applied ML) / Code Suggestions / AI Gateway 2026-03-18T11:16:14Z sam.figueroa SAM FIGUEROA

Yes this is the origin (no pun intended) of this change. https://gitlab.com/gitlab-org/gitlab/-/work_items/593773

tag:gitlab.com,2026-03-18:5216998621 SAM FIGUEROA pushed to project branch sf/fix/correct-param-for-flag-origin-593773 at GitLab.org / ModelOps / AI Assisted (formerly Applied ML) / Code Sugges... 2026-03-18T11:15:39Z sam.figueroa SAM FIGUEROA

SAM FIGUEROA (72387a73) at 18 Mar 11:15

fix: Correct origin param for vuln flag on secret_fp

... and 148 more commits

tag:gitlab.com,2026-03-18:5216996451 SAM FIGUEROA pushed to project branch sf/fix/correct-param-for-flag-origin-593773 at GitLab.org / ModelOps / AI Assisted (formerly Applied ML) / Code Sugges... 2026-03-18T11:15:08Z sam.figueroa SAM FIGUEROA

SAM FIGUEROA (8ffbaace) at 18 Mar 11:15

fix: Correct origin param for vuln flag on secret_fp

tag:gitlab.com,2026-03-18:5216977694 SAM FIGUEROA opened merge request !4928: fix: Correct origin param for vuln flag on secret_fp at GitLab.org / ModelOps / AI Assisted (formerly Applied ML) /... 2026-03-18T11:10:48Z sam.figueroa SAM FIGUEROA

What does this merge request do and why?

fix: Correct origin param for vuln flag on secret_fp

Changelog: fixed

How to set up and validate locally

Numbered steps to set up and validate the change are strongly suggested.

Merge request checklist

  • Tests added for new functionality. If not, please raise an issue to follow up.
  • Documentation added/updated, if needed.
  • If this change requires executor implementation: verified that issues/MRs exist for both Go executor and Node executor or confirmed that changes are backward-compatible and don't break existing executor functionality.
tag:gitlab.com,2026-03-18:5216977452 SAM FIGUEROA opened merge request !4928: fix: Correct origin param for vuln flag on secret_fp at GitLab.org / ModelOps / AI Assisted (formerly Applied ML) /... 2026-03-18T11:10:44Z sam.figueroa SAM FIGUEROA

What does this merge request do and why?

fix: Correct origin param for vuln flag on secret_fp

Changelog: fixed

How to set up and validate locally

Numbered steps to set up and validate the change are strongly suggested.

Merge request checklist

  • Tests added for new functionality. If not, please raise an issue to follow up.
  • Documentation added/updated, if needed.
  • If this change requires executor implementation: verified that issues/MRs exist for both Go executor and Node executor or confirmed that changes are backward-compatible and don't break existing executor functionality.
tag:gitlab.com,2026-03-18:5216968746 SAM FIGUEROA pushed new project branch sf/fix/correct-param-for-flag-origin-593773 at GitLab.org / ModelOps / AI Assisted (formerly Applied ML) / Code Sugge... 2026-03-18T11:08:41Z sam.figueroa SAM FIGUEROA

SAM FIGUEROA (9f78d483) at 18 Mar 11:08

fix: Correct origin param for vuln flag on secret_fp

tag:gitlab.com,2026-03-18:5216710473 SAM FIGUEROA opened issue #593964: Upload dialog hides true error message at GitLab.org / GitLab 2026-03-18T10:14:18Z sam.figueroa SAM FIGUEROA tag:gitlab.com,2026-03-17:5211497009 SAM FIGUEROA pushed to project branch main at SAM FIGUEROA / work_log 2026-03-17T08:23:36Z sam.figueroa SAM FIGUEROA

SAM FIGUEROA (c0498d89) at 17 Mar 08:23

Upate log and brag

tag:gitlab.com,2026-03-17:5211481899 SAM FIGUEROA commented on merge request !227357 at GitLab.org / GitLab 2026-03-17T08:19:39Z sam.figueroa SAM FIGUEROA

I agree with Duo here. This is a user provided input, so let's make sure it's a safely escaped string and truncate it to 250 chars.