Would you classify those commands as benign or malignant?
Does running those commands alter anything?
Sure you could argue they are used prior to an actual attack, but it's far easier to argue there are many legitimate uses.
This is the thing, I have a long history (10 years) of managing critical company information (customer/employee information including SS numbers and CC info) and resources (entrance keys, security codes, override abilities) and my integrity has NEVER been called into question.
In the context that I used it, it was totally benign and obviously no ill-will was there. Tampering would be defined as me trying to modify things to benefit myself somehow financially.