If an attacker has access to Hubot, then they already have access to everything the Hubot server can do.
If an attacker has access to Hubot, then they already have access to everything the Hubot server can do.