Vulnerable Design Patterns

An ‘improved’ operation defeats security. Alas new code by the bad guys is also possible. There is a unconscious notion that if only all the code on your machine were benign all problems would vanish. There is the unstated notion that the only defense is to be sure that there is no bad code on your machine; that is infeasible. (But of course they still want auto-run.)
Foxconn ‘Improvement’ the code