Isn’t that a bad practice for security as all permissions are accessible and therefore a bad actor can know how to alter there permissions field to gain access to things they otherwise shouldn’t have access to?