For example, if the author of the software you are running was held at gunpoint to release software with an incorrect hash -- then any utxo set it accepts via the load command will be a corrupted one, and would permit you to accept a invalid block and/or force you to reject a valid one. A savvy attacker would try to get many economically significant users running a corrupted utxo set and then concurrently produce transactions that the faithful nodes accept and corrupted reject, and that the corrupted accept and faithful reject-- in order to split the chain, and try to get holdouts on the faithful chain to follow the economically significant parties on the corrupted side.
I dunno if there is even any recorded process in place to validate the one placed into the software. Unlike assumevalid, where you can just check if your chain has the block in question (or any block explorer if you want to trust them), there doesn't appear to be an easy way to do so-- you have to roll back your entire chain to that AUTXO point, which takes you out for a long time and you can't do if you're pruned (without doing the terabyte scale IBD download again, of course). And given that, it seems on the last update only a single person has documented actually testing the value (
https://github.com/bitcoin/bitcoin/pull/31969 ). Although perhaps other people did so and didn't record their success.
As it stands I think it is a somewhat unsafe feature, though it's probably more unsafe for contributors to the project than it is for users, and the contributor unsafety is moderated by the fact that no one or almost no one uses this, yet.
It could be improved a lot if at some predictable interval nodes all cloned off and background hashed their UTXO set and stored the result so that anyone running a node can trivial audit the value just like they can with assumevalid (which gets more people reviewing that the value is correct). It would also be good if it got attested to in the same way the deterministic builds are, since the comparison ability is about as difficult as verifying the deterministic builds but with the added wrinkle that you have to have a node with an unpruned blockchain that you don't mind rolling back.
When I created AV a big part of the logic was that it was utterly trivial to audit if it was correct-- anyone running an existing node could check in a fraction of a second with one command, and even non-node runners could check against explorers-- and that any tampering also had to be with a collusion of the majority hashpower... and if the software review / distribution was so vulnerable that it could ship an unfaithful AV value then the same vulnerability could just let it ship something with the script checking commented out as that would be even more subtle than an unfaithful AV value and not require majority hashpower collusion to do damage. These arguments don't apply to the UTXO snapshots, they're hard to audit (arguably harder than the code) and don't require majority hashpower collusion to abuse so if anything the security process for them should be more strenuous.