The software creates a temporary file in a directory whose permissions allow unintended actors to determine the file's existence or otherwise access that file.