Some might say that it gives output to read that someone could then try to attack, e.g. you can see the jobs that
root runs and you can check to see if you have write privilege to them, effectively allowing to do anything - change passwords, copy SSH keys, delete critical data, copy sensitive data,.......
The people keeping the restriction might be persuaded to extract the records for the account you are trying to run with. A simple
grep would probably do the trick.
They could even schedule it each day with, um,
cron I suppose.
Robin