An attacker would need access to your pc to use it, but it still doesn't seem like a great idea.