Using a Prisma-Cloud key to pull policies from the console and then filtering using "--policy-metadata-filter policy.label=TEST2,policy.label=TEST1" does not throw an error if the role assigned to the key doesn't include Policies/View permission. Instead everything executes and displays results as normal, although unfiltered. This is  misleading for the end-user who assumes filtering has occurred..