Hijacking Unix Commands: How to Intercept and Modify Program Behavior
ยท 4 min read
This technique is useful when a program you can't modify calls CLI tools on your machine. For example, pet search
pipes output directly to fzf
with no filtering options. PATH hijacking lets you intercept and modify this behavior without changing either program.