Social Engineering Through Manpages
The manpages are not just documentation. They are trusted artifacts, etched into the daily command-line rituals of thousands. That trust makes them a perfect attack surface for social engineering.
Social engineering through manpages is subtle. It relies on the fact that developers rarely verify the truth hidden inside them. Command syntax, environment variables, flags—these can be altered or rewritten in ways that change behavior or introduce exploitable mistakes. A single misleading example in a manpage can lead even seasoned engineers to run commands with dangerous side effects.
Attackers can replace or modify local manpage files if they gain write access to documentation directories. This can happen through compromised packages, poisoned PATH entries, or tampered installation scripts. On multi-user systems, an unprivileged account with access to write user-specific manpage paths can silently override trusted docs. Because reading manpages is a routine action, the manipulated content feels legitimate. It bypasses skepticism.
Another vector is remote manpage hosting. Many engineers rely on web-based manpage mirrors for quick reference. A malicious site can serve altered pages that look authentic but direct the reader to use unsafe commands, deprecated flags, or flawed workflows. When paired with targeted phishing or supply-chain manipulation, this can deliver exploits without a single binary payload.
Defense starts with verification. Compare hash sums of documentation against known-good sources. Use package integrity checks and signed archives. Restrict write permissions to manpage directories. Favor official mirrors over unknown sites. Understand that manpages, like any interface, can be weaponized when trust exceeds scrutiny.
Social engineering is always about exploiting human trust. When that trust is embedded in authoritative technical content, the risk grows. Treat manpages as part of the attack surface. Audit them regularly. Educate teams to question what they read, even from supposed “sources of truth.”
Prevent manipulation before it spreads. See how to integrate secure documentation checks with live verification pipelines at hoop.dev in minutes.