Comment by onion2k

8 years ago

I wonder if it'd be possible to use their service to inject a backdoor in to someone else's code.

You just need to compromise their database and you should have access to plenty of source code running around, possibly with secrets/credentials etc - a disneyland for bad guys.