Suppose you release your app and then find you included an error in your network processing that allows an attacker to send some packets to your app and then gain control over it, forcing your app to execute any instructions the attacker wants it to.