Application Whitelisting bypasses - tutorial video by Casey Smith (https://twitter.com/subTee) Trusted Things That Execute Untrusted Things An Unhealthy Obsession YouTube video link: https://www.youtube.com/watch?v=dYVEUidAtUM
So in other words it's crucial to monitor these system tools. Now that I think of it, instead of building a "vulnerable apps" list, it's probably best to always think twice before letting some app run any system app. BTW, I haven't watched the whole video yet.