So every systemd service whose unit file has no User
directive runs as the root user. Are there any security implications of this? Should I not run untrusted code as a service w/o using User directive or does systemd have some sort of permission sandboxing even though the processes run as root?
Read next

How to prevent a public repo disaster🤔!!
Aadityasiva -

Every Arch Linux User Ever - Satire
Michael Crump -

Keycloakify: Create Keycloak themes using React
Garrone Joseph -

Vim CoC Explorer..Explorador de archivos más rápido de todos
Teo Dev -
Discussion (1)
I guess no security measures are taken by default, as there is a bunch of things you can do to sandbox services the way you want.