Security tooling is trusted because of what it does. It performs dangerous actions and is supposed to perform them safely. The trust is structural: you cannot build a meaningful defender without granting it the primitives attackers want. The enterprise asks its security tool to be the most privileged thing on every endpoint, and then asks the tool not to be hostile.
The pattern: an attacker reaches the tool itself, via code execution inside it, compromise of its update channel, abuse of its RPC interface, or the legitimate use of its documented API in unintended ways, and inherits every primitive the tool has on every endpoint it runs on. The attacker did not write the code that does file read across every disk in the fleet. The code was already there. The attacker just had to steer it.
What makes this specific (rather than generic trust-inversion) is the deploy-everywhere homogeneity. One compromise of a defender's agent does not just breach one machine. It breaches every machine where the agent runs, because the agent is the same binary doing the same job under the same trust model on each one. The blast radius scales with deployment footprint, which for a security product is usually: everywhere.