1. Attacker runs the cli process to generate the URL
2. Attacker sends the URL to the victim saying "as a second factor verification, you need to copy this code into this form"
3. Victim does it
4. Attacker enters the code into the original cli process