There is little in the way of validation for these requests. Anyone can simply announce ownership of a part of the code and claim it is stolen property. "Hey, I used a for loop once and that looks a lot like mine."
"And remember: Evil will always prevail, because Good is dumb." -- Spaceballs