The commit was wrong. The code was fine, but the story in the repository had shifted in ways no one saw coming. Git reset can fix that, but in the wrong hands, it’s a weapon. When paired with social engineering, it can rewrite history, distort blame, and alter trust.
Git reset changes the commit tree itself. It moves HEAD back to a previous state. Soft resets keep changes staged. Mixed resets keep changes in the working directory. Hard resets erase them. This is raw control over history. In environments without strict policy, it can be exploited.
Social engineering is not about code—it’s about people. A skilled manipulator can convince a teammate to run git reset --hard without protecting important work. They can persuade a maintainer to pull a branch that rearranges commit order for personal gain. Whether through chat, email, or code review comments, the vector is human trust.