You'd think, with all the software exploits out there, that we'd see some discussion of whether the ability to execute software passing through in-band is worth the trouble.
It's another A casual B casual C issue, where the relationship between As affordance (modification of software via data passing through that software) on C's results (the countless exploits) seem unconnected.