I don't think this discussion thread is giving the writer's concern enough credit. Universality
on its own obviously doesn't allow the instance to take over its host, but it
can enable the bulk of the malicious payload to be encoded as legitimate instances of whatever P-hard optimization problem the cloud service solves, so that it need not be injected directly via the actual vulnerability that the malicious actor uses to take over the host.
> TC isn't quite the actual top! There are ways to make problems that, even with an oracle for solving Halting, are still hard [0].
I'm not sure why you're raising the subject of the degrees here. Malicious software doesn't need to have hypercomputational powers to be a threat.