Repudiation

An attacker can pass data through the log to attack a log reader, and there's no documentation of what sorts of validation are done.

2