Your typing habits leak patterns attackers can exploit: reused commands, pasted secrets, and autoplay muscle‑memory in shells and config.
Disable auto-typing.