The Open Source Trojan Horse — Hidden Risk in Reused Code