Here are some non-spammy link building strategies that don't take much effort but result in high quality links.
An "authorized attacker" could exploit this weakness to gain elevated privileges, potentially reaching SYSTEM-level access.