Instruction: Describe how you would respond when untrusted files influence a coding workflow.
Context: Tests how the candidate diagnoses the problem, chooses the safest next step, and reasons through recovery. Describe how you would respond when untrusted files influence a coding workflow.
Official answer available
Preview the opening of the answer, then unlock the full walkthrough.
I would isolate the file path immediately and stop any sensitive action from that run. Then I would inspect how...
easy
easy
easy
easy
easy
easy