There are critical actions that can be used for the good development of the protocol, but the same functions can be performed by malicious individuals with the intention of harming users. Time Lock protects the user from malicious actions and individuals providing time to user protects their funds in case they identify suspicious activities.