This page contains Windows bias

About This Page

This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.

Bias Analysis

Bias Types:
⚠️ powershell_heavy
⚠️ windows_first
⚠️ missing_linux_example
Summary:
The documentation demonstrates a Windows bias by primarily referencing PowerShell-specific syntax (such as the use of backticks for escaping), mentioning PowerShell and Windows tools (Visual Studio Code, Git Bash) before Linux-native equivalents, and not providing explicit Linux/Bash-native command examples. While it notes that Bash shells like Git Bash can be used, it does not show concrete Bash/Linux-native command lines or address differences in escaping and file referencing in Bash versus PowerShell. This may confuse or disadvantage Linux users.
Recommendations:
  • Provide explicit Bash/Linux-native command examples alongside PowerShell examples, especially for commands where escaping or syntax differs.
  • Document the differences in file referencing and escaping between PowerShell and Bash (e.g., use of @request-body.json in Bash vs `@request-body.json in PowerShell).
  • Mention Linux-native shells (such as Ubuntu Bash, macOS Terminal) and editors (such as nano, vim) in prerequisites, not just Git Bash and Visual Studio Code.
  • Where PowerShell-specific syntax is discussed, provide the equivalent Bash/Linux syntax in parallel.
  • Consider using a tabbed interface or side-by-side examples for Windows/PowerShell and Linux/Bash users.
GitHub Create pull request

Scan History

Date Scan ID Status Bias Status
2025-07-12 23:44 #41 in_progress ❌ Biased
2025-07-12 00:58 #8 cancelled ✅ Clean
2025-07-10 05:06 #7 processing ✅ Clean

Flagged Code Snippets

az rest --method put --uri https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Authorization/policyAssignments/audit-vm-managed-disks?api-version=2023-04-01 --body `@request-body.json
az rest --method post --uri https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.PolicyInsights/policyStates/latest/queryResults?api-version=2019-10-01 --uri-parameters `$filter="complianceState eq 'NonCompliant' and PolicyAssignmentName eq 'audit-vm-managed-disks'"