This paperwarns about a possible malicious use of automation tools. Basic operations provided by these frameworks,
like mouse clicks, movements and keystrokes, could be exploited to build up more complex actions such as interaction
with user interfaces and controls (text boxes, buttons, etc.). Finally, such actions could be combined in order
to reproduce full user activities such as Web browsing, email sending, document writing and so on. The constructed
automation may be launched at a given time.