As with all tools such as this, it requires caution. And its good to be aware of these issues, considering that this tool can allow you to make better security decisions.
The link for this article located at Red Hat Magazine is no longer available.
The link for this article located at Red Hat Magazine is no longer available.