The recommendations are there for the unlikely event that you have a user savvy enough to access and manipulate the cached information, to implant false and carefully crafted data and thus be permitted to run a program or file that might normally be detected.
That's a very advanced and malicious user, and considering the scope of success they could achieve with this is limited to having physical access to the system I don't see how it could be a worthwhile attack vector.
Still, we put the information out there for your benefit.
Thanks for the further clarification. Makes sense as to why it wouldn't be recommended. Too bad the article didn't go into more detail, its not clear at all as to why you'd want to do that. Most people probably wouldn't do it after reading that article for that fact.