enc_none is imho just asking for trouble... usually the shell isn't the only place where db's are stored.. backups for example.
Those that have back-up access almost always have direct access to the originals so the backups thing is rather moot.
Jobe is correct, if someone can get your db's then they can get to far more damaging things than IRC passwords. Even if the passwords are hashed, any malicious person that can su, hack or otherwise gain access either authorized or not can still wreak total havoc. One example is copy your db's to their shell, start their copy of Anope from it .. using your enc_switcher module to reset all, most or even some of the passwords. Shut down your services, replace your db's with theirs and start your services again .. all done in the middle of the night. Give themselves uber access on YOUR network or anything else they can think of out of sheer bordom .. so getting plain text passwords is trivial compared to the other stuff that can be done.
Additionally if the malicious user happens to have root access on the shell server, it doesn't matter if passwords are hashed or not. Some of the Top 10 networks have plain text passwords so they can be retrieved. If they can survive for 15+ years with tens or even hundreds of thousands of users without having major issues with password theft other than users compromising their password themselves, why can't the other 99.9% of the IRC population?
It is completely possible to over accessorize something, and it's been happening to IRC since the mid 90's ... I can probably write out a list of hundreds of commands and features that aren't really needed or were written to "simplify" something by someone that didn't truely know how to use the basic IRC cmd set to start with.
</rant>