If it bears any resemblance to a product at all, your own admin-level access constitutes a potential security hole.
If it bears any resemblance to a product at all, your own admin-level access constitutes a potential security hole.