The user does not have direct access to the SA. But the SA is not just all code, there are data tables and other information, most of which I do not know at all how to decipher. That other data can be changed by the drive itself. It likely has no idea of partitions or data written, but it will log certain things (look up smart data as one example).
As for knowing if it is retrieving accurate data, the dump all script currently does not perform any checks on the modules that are read, except for mod01. I think I will add the basic checks (check for ROYL signature, make sure module id and size match, and perform a checksum check). Maybe I will do this soon if I have time. But until then you can check the module header yourself based on the info previously provided, and new link provided below, although you will need to use software to calculate the checksum (look at how the script does it).
Look here for Analysis of Western Digital ROYL firmware MOD 02:
http://www.hddoracle.com/viewtopic.php?f=59&t=821&hilit=analysis+of+mod+02The top of the very first post has info on how to decode the header of a module.