But the main characteristic of malware is that it works for someone other than the user, no? Research software works for the user themselves.
And something using keystroke injection to abuse the exception?
And something using keystroke injection to abuse the exception?