The miners have to run a full node themselves, and they have an honest view of the UTXO set. Any transaction that was created based on some malicious full node database would be rejected from the miner.
Exchanges, whales, explorers, devs, researchers, ... power users in general should run a full node, and they usually do so. Hence, miners are not in charge of the network security solely because other economically active nodes won't commit to any protocol breach, so they fork off in case of a compromised mining scene.