Yes and no. Without saying too little or too much, we deal with all kinds of possible attack vectors, and fixing wrong permissions is something very basic you might be able to do yourself without buying an automation product.
However, some security features in Vanilla Dpup, which Bookworm Pup64 inherited, were developed from a "prevent misconfigurations so they don't become a security issue" mindset. For example, spot can't access files under /root even if you give all users permissions to access this directory, thanks to a Landlock-based sandbox that filters file system access (a second layer of defence on top of classic file permissions), and spot can't gain root privileges via SUID root executables like sudo (if they can be fooled to run an arbitrary command, it runs as spot and not root). Turns out Bookworm Pup64 has wrong permissions for /root, probably still a common phenomenon in Puppy releases, allowing spot to view this directory. But, in this case, the sandbox kicks in and the messed up permissions don't become a big security issue.