Few hidden options allow to use application as a backdoor.
vulners.com/securityvulns/securityvulns:doc:30287