Where else is Google going to find someone that understands how to configure SELinux so it can be used in real life.
Oh, doh! I referenced real life in the same sentence as SELinux and Google in a Slashdot posting on the NSA.
We already know how to break into systems with buffer and heap overflows. We know how to do SQL injection into not-so-smart applications. If you work at it you can break into almost anything.
Absolutely no good purpose is served providing a toolkit that allows people to break into naively configured systems. Much of what you describe is akin to leaving the keys in your Maserati with the doors unlocked and the engine running. Please don't make things easier for joyriding teenagers.
If a site wants to know if they're secure, within the current limits of our knowledge, they can perform their own audits, and hire their own advisers to test their systems in a controlled fashion.
Applications, such as BOINC, have an unknown state of security review or audit. I doubt they applied the coding guidelines of CERT, or any of the Common Criteria levels. An administrator would only deploy such applications in the DMZ of their network. To call a Linux system, or Windoze system, secure means you've evaluated the risk of both the operating system and the applications on that system and decided it is good enough for you.
"If a burdensome regime of network neutrality is imposed on all parts of the Internet industry, it will inject an extraordinary amount of bureaucratic oversight into the economy's main growth engine to the future," Seidenberg said."We can't create a smart economy by dumbing down our critical infrastructure. "We can't move forward by pitting network providers and applications developers against each other when the real promise of broadband is an expanding pie for everyone."
""Holtzman also tried sending the mice to sleep with a drug that is being trialled for insomnia, called Almorexant. This reduced the amount of plaque-forming protein. He suggests that sleeping for longer could limit the formation of plaques, and perhaps block it altogether."
Thus spake the master programmer: "After three days without programming, life becomes meaningless." -- Geoffrey James, "The Tao of Programming"