Consider the security implications of arbitrary commands like he suggests, instead of using, I dunno, SSH or whatever.
If an attacker has access to Hubot, then they already have access to everything the Hubot server can do.