If you restrict its access by source IP, it might be ok.
For reference here is the post where the main author mentions this: