Ok, I see how this would expand the possible use cases of FlatBuffers.
I can generate a verifier function that returns true if it thinks it is impossible to touch memory outside the buffer during a traversal. This means bounds checking all offsets, and checking for string 0-termination.
This will still not stop an attacker from modifying, say, an int field, that you blindly use to index into some array, but that really is the client's responsibility. One thing that can help here is min & max meta data for each field, checking of which can be rolled into this verifier as well.
I'll make this a high priority item.