Hi,
bypassing authorization checks means game over. Think about malicious deleting some business critical data. Or you can execute any OS level commands. From OS level you can usually hop to another systems. Bypassing authorization check is possible only if you give authorization to change values in debugger. But don't be fooled that display only debugger is safe. A user can examine whole memory. So think about viewing data that are not supposed to be displayed to user.
Cheers