Kinda created your own security concern ... first ... who can get to syslog? I would hope only root/users on the moodle server. But by forwarding root email to a user off the server ... now the mail is in another mail server and under another users control.
Solutions? ....
1. never forward root email to another user off the server. Use ssh and alpine (a text based MTA) to check root mail. Of course that will soon slide off the list of things to do and the root inbox could build up to fill up the hard drive if limits are not set in sendmail/postfix.
Use another tool ... like Webmin ... that has other handy modules for admin of a Linux server. One tool ... read user mail ... ie, roots mail.
Set up another bash shell script to check size of root inbox and if over 40Megs, remove it. But then you have no history of where Moodle cron/task might have gone south (the ole 'catch 22').
2. investigate the 'quiet' option to the curl command.
if #2 then #3. use (pipe) | tee to log the output of curl to a moodlecron.log which would also be rotated by log rotate. Now you just have to remember to check the logs from time to time.
So you have options and no code need be changed. ;)
'spirit of sharing', Ken