Here are my beliefs
And what if...
1. You've discovered some minor vulnerability, which only may be exploited in extreme conditions, like a miner on a public IP.
2. You've made fuss about it here.
3. You've prepared a malicious software, which when ran on a Windows machine on the same LAN as miner allows
you to take control over miner.
4. Then you, the "benefactor" of the KNC users community, try to sneak your trojan to users and take their miners.
Bullshit? Maybe.
Impossible? Don't think so. Time will tell.
IMHO the best way to deal with the "vulnerability" would be a full, immediate disclosure.