Insider threat detection is often framed around suspicious logins, unusual file transfers, or strange privilege escalations. But in the real world, it’s just as likely to hide inside what looks like a minor terminal glitch. On Linux systems, a terminal bug can mask command injection, escalate subtle privilege misuse,