It provides a perspective to the development teams as to what security controls and logics are in place and also if the development team follow secure development practises or not.
The reports of a source code review can then be used for planning a penetration test and the reports of the pentest can be used for patches.