The security context when a user creates a stored program that accesses sensitive data but forgets that other people who can invoke the object have the same access is __________
(a) good
(b) bad
(c) illegal
(d) fare
The question was asked in a job interview.
The origin of the question is Setting Up Secure Connections in portion Access Control and Security of MySQL