TL; DR; BAD IDEA. This is the old behavior, while the sudo option is used by default for the NO OTHER UNIX-y OS I've ever encountered. The reason is that it is trivial to use and when using malicious code does this, it will have full control over your system.
The original very long rant-y message, correctly labeled blahdiblah:
Lol that's funny. I came here from Google because I could not remember how to change the previous behavior to this new, correct one (used by all other UNIX-y OS there). I did not even notice that my new Sierra Mack was now behaving correctly.
I already wrote on the Mac forums about this previous behavior, which is a gaping security hole. I even presented a three-line proof of the concept of the script, which would just sit (like a regular user), waiting for the sudo event to appear anywhere , and then instantly get root access to the system. I was booed from the threads by fans, after which I was forbidden to call a lie. Apple seems to be listening. Good job, this time, Cupertino. Bad BAD idea to try to revert
For reference, here is three-line. It does nothing malignant, it simply adds a dummy file to the root of the file system after receiving sudo. Run it in a script (or just paste it somewhere that does not already have sudo), or execute sudo in another terminal application / window or an application that uses sudo (e.g. TrueCrypt / VeraCrypt or similar), and then look at its operation .
tail -f -n 0 /var/log/system.log | grep -m 1 -E 'sudo\[[0-9]+\]:\s+'$USER echo "Gonna play around with root privs ..." sudo touch /kilroy-was-here
source share