I understand this line of reasoning, though you can also find "solutions" like "disable SELinux". If we believe the bell curve then it should not be a surprise :)
When it comes to security we basically have two options:
* Delegate security configuration to developers, allowing them to open unpluggable holes
* Delegate security configuration to users/admins, allowing them to shoot themselves in the foot
Developer can "fix" bugs by `pledge(EVERYTHING)` without actually finding the root cause, user can `privileges: ALL`, neither option protects us from foolishness. The core question is which option do we chose.
The most sane middle ground would be to allow users only to restrict privileges, not loosen up.