Security audits, etc, are possible because binary code closely implements what the source code says.
In this case, you have no idea what the weights are going to "do", from looking at the source materials --- the training data and algorithm --- without running the training on the data.