Or disguise malicious behavior as an action that follows a routine prompt. E.g. sort a requirements file and make a typo.