Hijacking Unix Commands: How to Intercept and Modify Program Behavior
· 4 min read

This technique is useful when a program you can't modify calls CLI tools on your machine. For example, pet search pipes output directly to fzf with no filtering options. PATH hijacking lets you intercept and modify this behavior without changing either program.