There is little in the way of validation for these requests. Anyone can simply announce ownership of a part of the code and claim it is stolen property. "Hey, I used a for loop once and that looks a lot like mine."
Dead? No excuse for laying off work.