Actually you rise a couple of interesting points.
It has been a while since I worked full time with a system administrator, could you please elaborate these?
> scanning the whole network should make the computer you're using as proxy banned from network pretty quickly.
So you can even DoS a machine without being caught?
> it would be up to workstation's security software to interrupt your script. Or edge firewall to trash it using DPI/Proxy.
How could identify it as malicious?