Things that can make you pause when researching a security tool for (certain applications and) potential use:
Vendor response: "We don't see that on large, well-behaved networks."
Researcher: "Of course you don't... Your tool can't find it!"
Vendor: *crickets*
🤨