Hacker can disguise slave and connect to master for malicious objective. In master, filtering of connection as slave is needed.