OK, if an attacker compromises the system using buffer overrun for example then she will get a highest privilage of access and delete all the stored procedures or any blockers...
Thanks for all your posts so far, it was really excited reading them all. When I finished my project and this article I started thinking of many other ways I could...