Instruction: Describe how you would respond when untrusted files influence a coding workflow.
Context: Tests how the candidate diagnoses the problem, chooses the safest next step, and reasons through recovery. Describe how you would respond when untrusted files influence a coding workflow.
Official answer available
Preview the opening of the answer, then unlock the full walkthrough.
I would immediately treat file contents as untrusted input and restrict any path that lets those contents directly shape tool use, shell execution, or network access. Coding agents are especially vulnerable because file instructions can look task-relevant while still steering toward unsafe actions.
Containment means tightening file-to-action boundaries,...
easy
easy
easy
easy
easy
easy