I don't think source code is the issue.
I'm not a hacker so take this with a grain of salt.
The hard part is figuring out how to get into and modify the code in the first place.
Since linux is under the gpl the source code should be freely available.
And since it's linux, it should be easy to identify where customizations have been made. It would be a matter of doing a byte by byte comparison.
|