I've never used them, but I would imagine they have to be executed by root or are suid. If you think about it, it isn't much different from opening up an xterm as root and more'ing out the contents of the log file. The fact that it doesn't accept input probably helps. But in general, anything that runs with root level permissions is a greater risk to your system if exploited.
|