Quote Originally Posted by Sys7emR00t View Post
Excuse me. I meant only that challenging the"use" of such an application shouldn't be questionable since I'm offering it to a security community that uses such applications to test and harden their own and other's computer networks.
I didnt challenge the use of it at all, I asked what the use was. Not an altogether unreasonable question.

I also pointed out some potential problems that you would need to address if you intended it for use in contracted penetration tests. But since you dont intend it for that type of use, you dont need to address this. I do suggest however that you should point out in the documentation of the tool that its not intended for that purpose, because some people may make assumptions to the contrary about the tool if its included with BackTrack - a penetration testing distribution.