Makes debugging stuck processes much easier. Currently disallowed:
attach: ptrace(PTRACE_ATTACH, ...): Operation not permitted Could not attach to process. If your uid matches the uid of the target process, check the setting of /proc/sys/kernel/yama/ptrace_scope, or try again as the root user. For more details, see /etc/sysctl.d/10-ptrace.conf
which is mostly useful on systems where secret information is expected in process memory but not on disk. This sounds unlikely for tool labs, but I'd like to be sure there's no other security issue I'm overlooking.