In an ideal world security tools like this one should be useless… but unfortunately we don’t all live in this world where security requirements are all captured, understood and implemented correctly.
This is what just an exemple, think about application level encryption, leakage in logger messages etc.