I could be wrong, but I think the question was more likely targeted at how possible it is for someone on the outside to inspect the source code for issues, rather than to try to use that source code for nefarious reasons.
2 Likes