Privilege Separation
We should keep in mind that it is not particularly beneficial from a security point of view to have to rely on running the target with full root privileges. It is therefore necessary to check whether it is possible that only certain parts of the target have root access.