Weakness or Malicious Compliance?