What if hackers insert malicious code into the open source?