134+ separate user accounts with restricted permissions) rather than relying solely on
135+ RPC access controls. While Bitcoin Core provides the `-rpcwhitelist` option to
136+ restrict which RPC commands specific users can access, and `-rpcwhitelistdefault`
137+ to control the default behavior for users without explicit whitelists, these should
138+ not be considered robust security boundaries, as users with access to certain
139+ commands may still be able to exploit functionality in unexpected ways.
The first few sentences seem largely redundant with the rest of the docs (see few paragraphs of “Security” section, and “Secure authentication”. However, the bit about whitelisting RPC commands for specific users seems helpful.
I think the existing docs make it pretty clear that other processes/users with access to the machine can comprise the node, but I think what is not obvious in the existing docs is that the other direction is true as well, someone with RPC access can probably compromise the machine the bitcoind node is running on.