Tampering

An attacker can take advantage of your custom key exchange or integrity control which you built instead of using standard crypto.

3