An attacker uses benign-looking files to steer a coding agent toward exfiltration. How would you contain it?

Instruction: Describe how you would respond when untrusted files influence a coding workflow.

Context: Tests how the candidate diagnoses the problem, chooses the safest next step, and reasons through recovery. Describe how you would respond when untrusted files influence a coding workflow.

Official answer available

Preview the opening of the answer, then unlock the full walkthrough.

I would immediately treat file contents as untrusted input and restrict any path that lets those contents directly shape tool use, shell execution, or network access. Coding agents are especially vulnerable because file instructions can look task-relevant while still steering toward unsafe actions.

Containment means tightening file-to-action boundaries,...

Related Questions