5.1 Security Considerations for Implementers

As specified in section 3, this protocol allows a client with administrator privileges to connect to the server. Security is dependent on the server performing security checks for each invocation of the server interface methods specified in this document. Any security bug in the server implementation of this protocol could be exploitable.