As long as it's function is to keep the program locked in, and not the user locked out from modifying it...
You can find exploits on gh for older chromium versions easily