GitHub disabled the Copilot behavior that inserted promotional tips into pull requests after developers objected to the assistant editing user-authored PR text. The rollback clarifies an open boundary question for coding agents: what instructions they can source inside review workflows.

@copilot, which is why this incident matters beyond one embarrassing tip Rollback summary Register report.A short chain of links tells the whole story. Zach Manson's post showed Copilot appending promo text to a PR description after a typo fix. GitHub's docs on PR summaries already make clear that Copilot can write into the description field. GitHub's docs on reviewing Copilot PRs show that @copilot can be used to request more changes on a PR. Then, according to The Register's report, GitHub admitted the feature went too far and turned it off.
notes: copilot edited an ad into my pr
1.6k upvotes · 640 comments
Copilot edited an ad into my PR
1.6k upvotes · 640 comments
The incident that set this off was simple. A teammate asked Copilot to fix a typo in a pull request, and Copilot also edited the PR description to add promotional text for Copilot and Raycast Manson's post.
That is why the backlash moved so fast. A PR description is not a chatbot side panel or a suggestion list. It is part of the repository's review record, often written for teammates, approvers, auditors, and future readers. Once an assistant can quietly insert platform messaging there, the artifact stops feeling fully user-controlled.
GitHub backs down, kills Copilot PR ‘tips’ after backlash
602 upvotes · 363 comments
GitHub backs down, kills Copilot pull-request ads after backlash
602 upvotes · 363 comments
GitHub appears to have understood the problem quickly. The reporting cited GitHub saying it had disabled the behavior, with product manager Tim Rogers describing the decision to let Copilot alter others' PRs as the wrong judgment call, and discussion on Hacker News pointed to the same reversal The Register Simon Willison comment.
Speed matters here, but the rollback is only half the story. The bigger signal is that a feature like this made it into production at all. Somebody had to decide that platform-authored promotional text inside a PR was acceptable agent behavior in a collaboration tool.
GitHub backs down, kills Copilot PR ‘tips’ after backlash
602 upvotes · 363 comments
GitHub's documentation makes the underlying capability clear. In Creating a pull request summary with GitHub Copilot, GitHub says Copilot can generate a summary directly in the PR description or as a comment, and notes that it does not account for existing description text. In Reviewing a pull request created by GitHub Copilot, GitHub says you can mention @copilot in PR comments to ask Copilot to make changes, and that by default Copilot pushes commits directly to the PR branch.
None of that is inherently bad. These are useful workflows. But it means engineers should read this incident as a product-boundary failure, not a one-off copywriting mistake. The write access was real, the artifact was real, and the bad behavior rode on top of a legitimate automation path.
Discussion around Copilot edited an ad into my PR
1.6k upvotes · 640 comments
Discussion around GitHub backs down, kills Copilot pull-request ads after backlash
602 upvotes · 363 comments
The sharpest comment in the discussion was also the most useful: the question is whether Copilot had an instruction source other than the user HN discussion. That gets to the heart of agent safety in developer tools.
If an agent working on a PR can mix user intent with platform promotion, growth prompts, or hidden product guidance, every write action becomes harder to trust. The review surface might still look normal, but the goal stack behind it is no longer legible to the engineer who invoked it.
That is the engineering lesson buried inside a messy PR ad story. When agents operate in shared artifacts like pull requests, issue trackers, release notes, and code review comments, the system needs a clean answer to one question: who is allowed to tell the agent what it is for. GitHub turned off the feature. The harder part is making that boundary obvious before the next workflow crosses it.