...
Sometimes, stronger restrictions than those provided by the default security manager are necessary. Custom permissions prove to be more suitable for privilege separation in such cases. Failure to provide custom permissions when no corresponding default permissions exist can lead to privilege escalation vulnerabilities that enable untrusted callers to execute restricted operations or actions.
This guideline addresses the problem of excess privileges. See SEC50-JG. Avoid granting excess privileges for another approach to solving this problem.
Noncompliant Code Example
...