your main concern would be files. If you run something as your usual suspect user, that software can do pretty much whatever it feels like with files under those permissions, unless sandboxed.
Not quite malware, but if someone wanted to troll you a goof rm -rf isn’t hard.
your main concern would be files. If you run something as your usual suspect user, that software can do pretty much whatever it feels like with files under those permissions, unless sandboxed.
Not quite malware, but if someone wanted to troll you a goof rm -rf isn’t hard.