this post was submitted on 12 Feb 2024
755 points (97.4% liked)

linuxmemes

20751 readers
560 users here now

I use Arch btw


Sister communities:

Community rules

  1. Follow the site-wide rules and code of conduct
  2. Be civil
  3. Post Linux-related content
  4. No recent reposts

Please report posts and comments that break these rules!

founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] MonkeMischief@lemmy.today 91 points 7 months ago (12 children)

Did they execute the command on localhost or the remote? Because hey if they had privileges to root-nuke the target that's gotta count for something right? Lmao

[–] neshura@bookwormstory.social 60 points 7 months ago (11 children)

The way this reads I think the company did not actually provide a good sandboxed environemt. So when they rm -rf /'d the thing they actually deleted a lot of stuff the recruiters still needed (likely the pentest environments for other candidates). Because imo that's the only reason I can think of to just outright ban a candidate from applying for any other role at the company.

[–] NocturnalEngineer@lemmy.world 22 points 7 months ago (1 children)

To be honest, considering the role they're applying for, I would reject their job application too even if it occurred inside a sandboxed environment.

They should know exactly what rm -rf does. The fact they didn't and they still arbitrary ran the command anyway... massive red flags. Could even say he failed to twart a social engineering attack.

[–] fkn@lemmy.world 13 points 7 months ago

The two cases, they knew what it was and they did it maliciously. They didn't know what they were doing and got socially engineered in the process. Both cases are cause for failure.

load more comments (9 replies)
load more comments (9 replies)