No amount of source-level verification or scrutiny will protect you from using untrusted code.
"Reflections on Trusting Trust". Communications of the ACM 27 (8), (pp. 761-763), August 1984.
No amount of source-level verification or scrutiny will protect you from using untrusted code.