(and probably other ones)

But yeah, usually you are aiming to:

* avoid leaking source code/IP
* avoid leaking unique or shared private keys
* avoid tampering, running unsigned firmware