Once the permissions are set for the app development, then the data and code are restricted to the authorized users only. If the code is kept without any restriction or accessible to anyone then there are chances of compromise of code which results in defect leakage.