Only when the code match by the key
Arbitrary code execution attack is Turing complete attack
Attackers often try to circumvent the Code Integrity policy. If they can execute any code they want, they can also exploit other areas, like altering valuable data, penetrating data, or attacking sandboxes.