You are not the only thing capable of running binaries on your system. There’s always the possibility of something else being compromised that now has the capability to run this binary.
Security comes in many layers on top of each other and with software having to work together to plug all possible holes, not just the direct exploitation paths you are currently actively conscious about and using.
You are not the only thing capable of running binaries on your system. There’s always the possibility of something else being compromised that now has the capability to run this binary.
Security comes in many layers on top of each other and with software having to work together to plug all possible holes, not just the direct exploitation paths you are currently actively conscious about and using.