Comment by dmurray
It's important that he's hacking a system developed by (presumably) his lecturer or professor, not by the university's IT department.
The professor hopefully has an interest in actual security research and some level of intellectual curiosity in general. The IT department is more likely to run on security by checklist and certification, and much more likely to throw the student under the bus of some Academic Misconduct Committee.
The professor did take this very well, as it happened - he asked me to come along to one of his office hours to discuss how I did it and what I might do to prevent it, among other things. The quote "if you can exploit it like this, you're not really the target audience and you've already achieved the aims of the module" from the article is basically something he said to me word-for-word in that chat - in the end, it almost seemed like he was hoping someone would go after the implementation itself!
(I wrote this article)