I attached the BugScan appliance to my home lab network, which uses a 4-point D-Link DI-614+ router. I tossed several EXE and DLL files at it and examined the output. Some of the files were EXEs written by me, others were simply Windows executable files.
In addition, HBGary gave me Internet access to one of their systems running a later version of the software, 2003A, scheduled for release in mid-March. This 2003A version also has a few goodies not present in the 2003 version: for one, it will locate the class of buffer overrun bug exploited by the MSBlaster worm. The new BugScan engine also will do "back tracing" from a problem location to determine whether an involved variable could be affected by input (insecure code that can be affected by externally supplied data is even more volatile).