> malicious actor can always check if it's being run under some tool like this

Yes, or simply leave a vulnerability around that can be later exploited.

Reply via email to