"Malicious gadgets -- if a user were to download one of them --
could be used in a variety of other attacks, including one where
one gadget steals information from another, a valuable attack
against gadgets that store personal user information, Hansen and
Stracener said. "How do you know it's a legitimate gadget?" Hansen
asked. "Because someone uploaded it? There's no moderation; there's
no way to guarantee it won't turn bad.""