logoalt Hacker News

thih9yesterday at 10:09 PM0 repliesview on HN

Or disguise malicious behavior as an action that follows a routine prompt. E.g. sort a requirements file and make a typo.