Still, this is entirely feasible. The encryption community is so secret that they more than likely know about weaknesses in cryptoschemes that the open source developers are not privy to. It may be possible, for example, to submit code that generates certain types of weak keys that are not otherwise known to be weak by open source developers.