I wonder if the firmware.bin file was extracted with binwalk if it would give any insight into what they’ve done with Klipper. It’s unlikely to reveal anything but you start with what you have access to.
I used to use binwalk to extract the firmware on those cheap security camera hub motherboards and they all had hidden users with open SSH ports not visible on the user interface. They all “phone home” as soon as you plug them into your network. They stopped publishing the firmware.bin file for them about 8 years ago and moved to a live update system. So now you have to port scan or monitor them with netstat to see what they’re doing.
If they won’t honor the license terms for Klipper then it could be a security issue, they could have setup hidden logins through Klipper and placed a back door into the users network.