@RichiH @maxinstuff Yes, perhaps my approach wasn't excellent; I could have explained the situation earlier. But the outcome wouldn't have been different. Fundamentally, what saddens me is this average attitude of presumption of guilt. If I don't see SSH, I assume it's vulnerable and therefore I intervene. Unfortunately, this is just one of many experiences in this regard...
@stefano @maxinstuff NB: I don't have a strong urge to get into an XKCD 386 situation; I'm happy to just drop it.
That being said, I do observe deflection and diversion rather than acceptance.
While I agree that first level is, well, first level, and thus tied to tight scripts with little agency, a robust process must be designed to default to secure. As such "unless we can checkbox it we need to look more deeply" is usually the local maxima between time & cost efficiency and secureness.