
The spoof comand is by raw. It's the bonus that isn't.
Spoof Command (Spoof)
You send a command to a device or agent, pretending it is from an
authorized source. You must have an access ID from which the target
accepts commands (usually by making a Matrix Perception test on the
authorized source or by tracing its icon). To spoof a target, choose
a command (per the Issue Command action, p. 229) and make an
Opposed Test between your Hacking + Spoof and the target’s Pilot
+ Firewall (System + Firewall for peripheral devices); if you succeed,
the target accepts the command as legitimate. Each Spoof Command
action applies only to a single command; multiple commands require
multiple Spoof Command attempts.