No need to guess behavior
Full access to all possible scenarios
Scales well
Developer friendly
Uncovers all instances of a vulnerability