Appearance
Why It Matters
Project policy forbids network access, but repository contains network behavior.
What Triggers
Document the concrete trigger shape, scope boundaries, and examples for SEC402 here.
False Positives
Capture the realistic false-positive envelope and when this rule should stay enabled.
Remediation
Describe the preferred remediation flow, including when to rely on built-in fixes or suggestions.