Sure, if its compromised. Well, there you go, full access to whatever on a system-level. This is what I want to achieve :P