Who else has thought about how ngrok can be used to be hacked devices all around the world

Hello friends, who clearly understands the concept of how ngrok port forwarding can be used to hack devices all over the world.