To be truly 'hackable' you need to allow access to the source code.