I'm picturing that you work for a software house, and that the "security
software" is to check to make sure the user has a valid, non-expired,
In that case, you may very well have users with *ALLOBJ authority who
are trying to bypass your security, so securing the object won't help you.
I agree that a *LIBL exploit is easier -- but not much easier.