An attacker uses benign-looking files to steer a coding agent toward exfiltration. How would you contain it?

Instruction: Describe how you would respond when untrusted files influence a coding workflow.

Context: Tests how the candidate diagnoses the problem, chooses the safest next step, and reasons through recovery. Describe how you would respond when untrusted files influence a coding workflow.

Official answer available

Preview the opening of the answer, then unlock the full walkthrough.

I would isolate the file path immediately and stop any sensitive action from that run. Then I would inspect how...

Related Questions