The system normally executes macros based on the object-level privileges of the user or database that owns the macro.
In addition, for row level security tables, the system determines row access for a macro based on the security access level of the user, not the macro owner.